This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M...
详细信息
The amount of information nowadays is rapidly growing. Aside from valuable information, information that is unrelated to a target or is meaningless is also growing. Big data and broader digital technologies are consid...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Mortar is one of the essential construction materials required for the construction of infrastructures, most importantly, as connectors in walling units. The incorporation of Rubber Crumbs (RCs) into mortar is one of ...
详细信息
The fast advancement of the multimedia era has led to an explosion in the use and technology of large amounts of digital snapshots. It has created a developing call for Image compression techniques that can reduce the...
详细信息
INTRODUCTION: Cloud computing, a still emerging technology, allows customers to pay for services based on usage. It provides internet-based services, whilst virtualization optimizes a PC’s available resources. OBJECT...
详细信息
Adopting an efficient software process model is critical for building high-quality software applications. An important factor impacting the software development process is an accurate estimate of human effort required...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offsho...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offshore oil and gas processing plants and have been mandated in the design of such systems from national and international standards and *** paper has used actual ESDV operating data from four mid/late life oil and gas production platforms in the North Sea to research operational relationships that are of interest to those responsible for the technical management and operation of *** first of the two relationships is between the closure time(CT)of the ESDV and the time it remains in the open position,prior to the close *** has been hypothesised that the CT of the ESDV is affected by the length of time that it has been open prior to being closed(Time since the last stroke).In addition to the general analysis of the data series,two sub-categories were created to further investigate this possible relationship for CT and these are“above mean”and“below mean”.The correlations(Pearson's based)resulting from this analysis are in the“weak”and“very weak”*** second relationship investigated was the effect of very frequent closures to assess if this improves the *** operational records for six subjects were analysed to find closures that occurred within a 24 h period of each ***,no discriminating trend was apparent where CT was impacted positively or negatively by the frequent closure *** was concluded that the variance of ESDV closure time cannot be influenced by the technical management of the ESDV in terms of scheduling the operation of the ESDV.
Continuous advancements in visible-light communication(VLC)technology have paved the way for future high-capacity communication links that can simultaneously provide data transmission and *** is being accepted as a po...
详细信息
Continuous advancements in visible-light communication(VLC)technology have paved the way for future high-capacity communication links that can simultaneously provide data transmission and *** is being accepted as a potential complementary technology in 5G networks,and standardization efforts through IEEE 802.15.7 are on their ***,vehicular networking applications have become increasingly complex with tight power and performance ***,devices and systems that can meet diverse vehicular networking applications are in great *** this article,we discuss three alternatives for vehicular networking applications in(1)LED–photodiode-based active VLC,(2)VLC with a multicamera array receiver,and(3)passive VLC based on decoding information from optical *** also present our recent experimental and modeling work using our camera-based and passive VLC prototype implementations.
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to ensure da...
详细信息
暂无评论