The dynamic growth of the digital ecosystem presents evolving cybersecurity considerations, highlighting the constant change and emergence of new security concerns. While cloud providers offer robust security for the ...
详细信息
With the emergence of blind spot reconstruction networks in hyperspectral anomaly detection, a series of new challenges have arisen. The most significant issues include local anomaly identity mapping and inaccurate de...
详细信息
The increasing challenges associated with waste management necessitate advanced technologies to enhance the efficiency of recycling processes. In this work, we present a comprehensive study utilizing the WaRP (Waste R...
详细信息
In our rapidly evolving technological landscape, AI tools have gained substantial power and integration across various domains. Through interviews and surveys conducted at a University in the Netherlands, we investiga...
详细信息
This study explores the effectiveness of combining BERT (Bidirectional Encoder Representations from Transformers) with convolutional neural networks (CNN) and multilayer perceptrons (MLP) for a specific task. The resu...
详细信息
Social media resurgence of antisocial behavior has exerted a downward spiral on stereotypical beliefs, and hateful comments towards individuals and social groups, as well as false or distorted news. The advances in gr...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile...
详细信息
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tiles in turn until they complete a winning hand. An important notion in Mahjong is the deficiency number(*** number in Japanese Mahjong) of a hand, which estimates how many tile changes are necessary to complete the hand into a winning hand. The deficiency number plays an essential role in major decision-making tasks such as selecting a tile to discard. This paper proposes a fast algorithm for computing the deficiency number of a Mahjong hand. Compared with the baseline algorithm, the new algorithm is usually 100 times faster and, more importantly,respects the agent's knowledge about available tiles. The algorithm can be used as a basic procedure in all Mahjong variants by both rule-based and machine learning-based Mahjong AI.
An intelligent robotic vehicle with an ultrasonic sensor that can avoid obstacles in its path is the research idea. This sensor recognizes obstructions, permitting the vehicle to perform activities like halting, turni...
详细信息
This paper presents a hybrid search based retrieval-augmented generation (RAG) system in the domain of history, in Serbian language. The system was implemented in Python programming language, and is based on Google BE...
详细信息
暂无评论