The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ...
详细信息
Dialogue policy trains an agent to select dialogue actions frequently implemented via deep reinforcement learning (DRL). The model-based reinforcement methods built a world model to generate simulated data to alleviat...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are sti...
详细信息
To reduce system complexity and bridge the interface between electronic and photonic circuits,there is a high demand for a non-volatile memory that can be accessed both electrically and ***,practical solutions are still lacking when considering the potential for large-scale complementary metal-oxide semiconductor compatible ***,we present an experimental demonstration of a non-volatile photonic-electronic memory based on a 3-dimensional monolithic integrated ferroelectric-silicon ring *** successfully demonstrate programming and erasing the memory using both electrical and optical methods,assisted by optical-to-electrical-to-optical *** memory cell exhibits a high optical extinction ratio of 6.6 dB at a low working voltage of 5 V and an endurance of 4×10^(4) ***,the multi-level storage capability is analyzed in detail,revealing stable performance with a raw bit-error-rate smaller than 5.9×10^(−2).This ground-breaking work could be a key technology enabler for future hybrid electronic-photonic systems,targeting a wide range of applications such as photonic interconnect,high-speed data communication,and neuromorphic computing.
Recently, deep learning has been widely employed across various domains. The Convolution Neural Network (CNN), a popular deep learning algorithm, has been successfully utilized in object recognition tasks, such as fac...
详细信息
Deep learning approaches have attained remarkable success across various artificial intelligence applications, spanning healthcare, finance, and autonomous vehicles, profoundly impacting human existence. However, thei...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
With the rapid growth and adoption of web-based technologies, more and more service providers offer various services on the web. This can facilitate the organizations to develop business applications using web service...
详细信息
Edge Computing (EC) is a distributed network architecture offering computation and storage resources at the network edge, addressing cloud computing limitations by optimizing latency and enhancing data safety and priv...
详细信息
Vehicular ad hoc networks (VANETs) role a vital play in allowing technology for future cooperative intelligent transportation systems (CITSs). Vehicles in VANETs transmit real-time data on their movement, traffic, and...
详细信息
Flood disasters pose significant threats to human lives and infrastructure, necessitating advanced methods for the timely and accurate monitoring of water levels in rivers. This study introduces an innovative approach...
详细信息
暂无评论