Dirac-vortex microcavity laser based on InAs/InGaAs quantum dots have been experimentally realized on silicon *** topological laser features a large spectral range and high robustness against variations such as cavity...
详细信息
Dirac-vortex microcavity laser based on InAs/InGaAs quantum dots have been experimentally realized on silicon *** topological laser features a large spectral range and high robustness against variations such as cavity size.
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
With the exponential growth in information related applications and the continuous increase in voice over IP (VoIP) applications, the carriers are expanding their networks to provide improved services to their end use...
详细信息
Edge computing devices in Internet-of-Things (IoT) systems are being widely used in diverse application domains including industrial automation, surveillance, and smart housing. These applications typically employ a l...
详细信息
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mappi...
详细信息
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital ***,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic *** signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic *** the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training *** overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM ***,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted *** research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and *** algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential ***,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment.
Purpose: This study aims to investigate and compare three nonplanar (NP) slicing algorithms. The algorithms aim to control the layer thickness variation (LTV), which is a common issue in supportless fabrication of fre...
详细信息
Artificial intelligence (AI)-based learning control plays a critical role in the evolution of intelligent control, particularly for complex network systems. Traditional intelligent control methods assume the agent can...
详细信息
Originally, protocols were designed for multi-agent systems (MAS) using information about the network which might not be available. Recently, there has been a focus on scale-free synchronization where the protocol is ...
详细信息
Model stealing attacks on AI/ML devices undermine intellectual property rights, compromise the competitive advantage of the original model developers, and potentially expose sensitive data embedded in the model’s beh...
详细信息
The agriculture sector plays an important role to the nation's economy, contributing significantly to GDP and employing a sizable section of the labour force. Nonetheless, precisely projecting food production and ...
详细信息
暂无评论