Recently, Wei & Chen proposed a secure three-party mutual authentication protocol for RFID based on elliptic curve cryptography (ECC). Their approach can allow insecure communication between the reader and the bac...
详细信息
ISBN:
(纸本)9798400711862
Recently, Wei & Chen proposed a secure three-party mutual authentication protocol for RFID based on elliptic curve cryptography (ECC). Their approach can allow insecure communication between the reader and the backend, so their approach must achieve mutual authentication between the tag, reader, and backend. In addition, their method also satisfies the essential characteristics of RFID systems, such as confidentiality, anonymity, resistance to tracking attacks, and spoofing attacks. However, this article finds that its method cannot meet the mutual authentication and denial of service attacks.
With the development of wireless sensor networks,the demand for wireless sensors increased *** the same time,there is a problem that the storage of energy is relatively low due to the small size of wireless sensors,wh...
详细信息
With the development of wireless sensor networks,the demand for wireless sensors increased *** the same time,there is a problem that the storage of energy is relatively low due to the small size of wireless sensors,which means that it needs to replace when sensors are out of *** will cost huge finance and pollute the ***,many scholars propose using wireless sensors that can recharge instead of primary wireless *** this case,choosing a suitable route to charge wireless sensors has become a significantly critical problem as there is a relationship between energy loss and the charging *** it is unstable or unsuitable to use solar energy and wind energy to charge,charging wireless sensors using drones,proposed by Kulaea ***1,Han Xu,and Bang Wang [1],has become a feasible ***,this solution still has some drawbacks as it only uses energy to charge the point with the lowest energy level by drones without considering the priority,the rest of the power,and the efficiency of time and *** report will use the data about the utilization rate of energy and make some comparisons to improve this solution.
We address the problem of learning new classes for semantic segmentation models from few examples, which is challenging because of the following two reasons. Firstly, it is difficult to learn from limited novel data t...
详细信息
The Neural Networks (NN) model which is incorporated in the control system design has been studied, and the results show better performance than the mathematical model approach. However, some studies consider that onl...
详细信息
The Neural Networks (NN) model which is incorporated in the control system design has been studied, and the results show better performance than the mathematical model approach. However, some studies consider that only offline NN model learning and does not use the online NN model learning directly on the control system. As a result, the controller's performance decreases due to changes in the system environment from time to time. The Reinforcement Learning (RL) method has been investigated intensively, especially Model-based RL (Mb-RL) to predict system dynamics. It has been investigated and performs well in making the system more robust to environmental changes by enabling online learning. This paper proposes online learning of local dynamics using the Mb-RL method by utilizing Long Short-Term Memory (LSTM) model. We consider Model Predictive Control (MPC) scheme as an agent of the Mb-RL method to control the regulatory trajectory objectives with a random shooting policy to search for the minimum objective function. A nonlinear Mass Spring Damper (NMSD) system with parameter-varying linear inertia is used to demonstrate the effectiveness of the proposed method. The simulation results show that the system can effectively control high-oscillating nonlinear systems with good performance.
Without labeled question-answer pairs for necessary training, unsupervised commonsense question-answering (QA) appears to be extremely challenging due to its indispensable unique prerequisite on commonsense source lik...
详细信息
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer le...
详细信息
ISBN:
(数字)9798350364538
ISBN:
(纸本)9798350364545
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer learning with fine-tuning. The purpose of this study was to evaluate the accuracy, precision, recall, F1-score, and computational efficiency of the system being considered. To augment the dataset included 1000 photos that were equally divided between those showing tattoos and those that did not show tattoos. A k-fold cross-validation approach was employed in training and testing the models. Although custom CNNs are effective, utilizing pre-trained ones like ResNet-50 can offer even better outcomes. Specifically, ResNet-50 attained a higher accuracy (0.86 compared to 0.79), precision (0.85 versus 0.78), recall (0.91 against 0.86), and F1-score (0.91 vis-a-vis 0.86) as compared to custom CNNs. In selecting these models for examination, two main motivations were considered. The first motivation is to see whether transfer learning with a pre-trained ResNet-50 model does well when compared with a customized CNN designed specifically for tattoo detection. Secondly,the intent of this study is to know what advantages can be derived from each approach and their demerits too. Furthermore, it seeks to determine if transfer learning can provide an alternative in contrast to the common CNN techniques with regards to precision and computational efficiency. In this research, two models will be evaluated in order to answer the question of what is better for tattoo detection: transfer learning or designing custom architectures.
Based on the tremendous success of pre-trained language models (PrLMs) for source code comprehension tasks, current literature studies either ways to further improve the performance (generalization) of PrLMs, or their...
详细信息
A substantial number of people are presently making use of decentralised cryptocurrencies that are built on blockchain technology. These crypto currencies have garnered a lot of interest over the course of the last fe...
详细信息
Stunting in toddlers is a chronic nutritional issue that affects the physical and cognitive development of children, with serious long-term consequences such as reduced cognitive function and an increased risk of chro...
详细信息
暂无评论