Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization...
详细信息
Session-based recommendation aims to predict the anonymous user’s next click action based on his/her latest click sequence. Most state-of-the-art approaches use graph neural networks to model sessions as graphs to ca...
详细信息
With the rapid development of artificial intelligence(AI)technology,the demand for high-performance and energyefficient computing is increasingly *** limitations of the traditional von Neumann computing architecture h...
详细信息
With the rapid development of artificial intelligence(AI)technology,the demand for high-performance and energyefficient computing is increasingly *** limitations of the traditional von Neumann computing architecture have prompted researchers to explore neuromorphic computing as a *** computing mimics the working principles of the human brain,characterized by high efficiency,low energy consumption,and strong fault tolerance,providing a hardware foundation for the development of new generation AI *** neurons and synapses are the two core components of neuromorphic computing *** perception is a crucial aspect of neuromorphic computing,where artificial sensory neurons play an irreplaceable role thus becoming a frontier and hot topic of *** work reviews recent advances in artificial sensory neurons and their ***,biological sensory neurons are briefly ***,different types of artificial neurons,such as transistor neurons and memristive neurons,are discussed in detail,focusing on their device structures and working ***,the research progress of artificial sensory neurons and their applications in artificial perception systems is systematically elaborated,covering various sensory types,including vision,touch,hearing,taste,and ***,challenges faced by artificial sensory neurons at both device and system levels are summarized.
This paper presents a novel framework aimed at enhancing the experimental methodology within cognitive psychology, integrating both informal and formal components to accommodate varied reasoning approaches. The framew...
详细信息
Polycystic ovary syndrome (PCOS), a common endocrine-metabolic disorder affecting about 10-13% of women during reproductive age worldwide, often leads to irregular menstruation, infertility, obesity, and long-term hea...
详细信息
Microelectromechanical system (MEMS) based pressure sensors have been utilized for decades;however, new trends in pressure sensors have recently emerged, such as increased sensitivity, a broader range and reduced chip...
详细信息
Navigation services enable users to find the shortest path from a starting point S to a destination D, reducing time, gas, and traffic congestion. Still, navigation users risk the exposure of their sensitive location ...
详细信息
The given paper introduces a multi-staged AI-driven intrusion prevention system (IPS) that utilizes mathematical foundations like statistical analysis, probabilistic models, and optimization techniques to design strat...
详细信息
Large Language Models (LLMs) have shown impressive capabilities across various fields, including across social sciences. While research has explored LLMs’ emotion capabilities, studies on coping mechanisms are limite...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in dealing with flaws in quality control process of SCM. While it may have started with shipment tracking, the outcome of using IoT on supply chains has spread to every link in the chain. For instance, manufacturers are employing Internet-enabled sensors in production to find product faults, resulting in higher-quality production runs. Physical Unclonable Function (PUF) is a security mechanism that exploits the unique, unrepeatable physical characteristics of hardware components to generate distinct cryptographic keys or identifiers, typically for a semiconductor device like an Internet of Things (IoT) device. The unique identification of IoT devices along the supply chain is implemented by using PUFs as tamper-resistant IDs. Blockchain, the distributed, immutable ledger, on the other hand is the disruptive technology that provides higher security as compared to traditional centralized systems. The integration of PUF and blockchain proves to be quite interesting while handling the above issues of authentication. A smart contract on the blockchain is a software code that executes spontaneously as and when the conditions of the contract or agreement are satisfied. Hence after authentication process the results are fed to blockchain smart contract for the final validation. This paper presents a novel permissioned blockchain smart contract-based lightweight authentication scheme for SCM using PUF of IoT known as SPUFChain. Informal and formal security analysis (using AVISPA and BAN logic) of the proposed framework show its potential to combat several attack scenarios like man-in-the middle, non-repudiation, impersonation, replay attacks and many other security features as compared to other related schemes. The processing time (~13.8ms) is better than existing
暂无评论