In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting th...
详细信息
System W is an approach to reasoning from conditional beliefs that exhibits many properties desirable for nonmonotonic reasoning like extending rational closure, avoiding the drowning problem, and complying with synta...
详细信息
Efficiently verifying the customer’s identity is essential for ensuring the security of online transactions. Such verification is mainly accomplished according to the widespread Know Your Client (KYC) protocol, which...
详细信息
Efficiently verifying the customer’s identity is essential for ensuring the security of online transactions. Such verification is mainly accomplished according to the widespread Know Your Client (KYC) protocol, which relies on a self-identification handled by the user, typically providing personal data from their identification document (ID). In the current digital communication generation, such a task is usually performed by uploading a digital copy of the document by scanning or taking a real-time picture from a personal device such as a smartphone or tablet. Such activity, which usually involves manual data entry, is time-consuming and prone to human errors. Document Understanding (DU) has emerged as a crucial factor for automating data extraction in this scenario. One of its main challenges is the scarcity of data, which is barely available for security and privacy concerns. To this end, this paper proposes a solution that takes advantage of recent advances in DU to devise an innovative strategy for Identity Document Recognition (IDR), i.e., the task aimed at automatically understanding, extracting, and transcribing the fields of an ID card. We devised a two-stage approach based on fine-tuning a pre-trained model on synthetic and real-world data. We also developed a dedicated synthetic data generation tool to support the IDR process. Experimental results demonstrated the effectiveness of our methodology.
In this study, we introduce the pied kingfisher optimizer (PKO), a novel swarm-based meta-heuristic algorithm that draws inspiration from the distinctive hunting behavior and symbiotic relationships observed in pied k...
详细信息
In this study, we introduce the pied kingfisher optimizer (PKO), a novel swarm-based meta-heuristic algorithm that draws inspiration from the distinctive hunting behavior and symbiotic relationships observed in pied kingfishers in the natural world. The PKO algorithm is structured around three distinct phases: perching/hovering for prey (exploration/diversification), diving for prey (exploitation/intensification), and fostering symbiotic relations. These behavioral aspects are translated into mathematical models capable of effectively addressing a wide array of optimization challenges across diverse search spaces. The algorithm’s performance is rigorously evaluated across thirty-nine test functions, which encompass various unimodal, multimodal, composite, and hybrid ones. Additionally, eight real-world engineering optimization problems, including both constrained and unconstrained scenarios, are considered in the assessment. To gauge PKO’s efficacy, it is subjected to a comparative analysis against 3 categories of rival optimizers. The 1st category comprises well-established and widely-cited optimizers such as particle swarm optimization and genetic algorithm. The 2nd category encompasses recently published algorithms, including Harris Hawks optimization, Whale optimization algorithm, sine cosine algorithm, Grey Wolf optimizer, gravitational search algorithm, and moth-flame optimization. The 3rd category includes advanced algorithms, such as covariance matrix adaptation evolution strategy and Ensemble Sinusoidal Differential Covariance Matrix Adaptation with Euclidean Neighborhood (LSHADE-cnEpSin). The comparative analysis employs various performance metrics, including the Friedman mean rank and the Wilcoxon rank-sum test, to reveal PKO’s effectiveness and efficiency. The overall results highlight PKO’s exceptional ability to tackle intricate optimization problems characterized by challenging search spaces. PKO demonstrates superior exploration and exploitation tend
Security, heterogeneity, and interoperability are the prominent concerns in wireless sensor networks (WSNs) with restricted amounts of resources such as energy, transmission range, and processing of packets. Moreover,...
详细信息
Algorithms for finding the sink in Unique Sink Orientations (USOs) of the hypercube can be used to solve many algebraic, geometric, and combinatorial problems, most importantly including the P-Matrix Linear Complement...
详细信息
Despite their widespread application in modern systems, container composition is often complex and error-prone. In this work, we present DBCChecker, a tool aiming to verify security properties of systems obtained by c...
详细信息
Cloud computing is an emerging domain that is capturing global users from all walks of life—the corporate sector,government sector,and social arena as *** cloud providers have offered multiple services and facilities...
详细信息
Cloud computing is an emerging domain that is capturing global users from all walks of life—the corporate sector,government sector,and social arena as *** cloud providers have offered multiple services and facilities to this audience and the number of providers is increasing very *** enormous pace is generating the requirement of a comprehensive ecosystem that shall provide a seamless and customized user environment not only to enhance the user experience but also to improve security,availability,accessibility,and *** technology is providing robust solutions to many of our problems,the cloud platform is one of *** is worth mentioning that these solutions are also amplifying the complexity and need of sustenance of these rapid *** with cloud computing,new entrants as cloud service providers,resellers,tech-support,hardware manufacturers,and software developers appear on a daily *** actors playing their role in the growth and sustenance of the cloud *** objective is to use convergence for cloud services,software-defined networks,network function virtualization for infrastructure,cognition for pattern development,and knowledge *** order to gear up these processes,machine learning to induce intelligence to maintain ecosystem growth,to monitor performance,and to become able to make decisions for the sustenance of the *** may be programmed to“superficially”imitate most business applications and create large numbers using lightweight workload generators that merely stress the *** today’s current IT environment,when many enterprises use the cloud to service some of their application demands,a different performance testing technique that assesses more than the storage is *** and storage are merged into a single building block with HCI(Hyper-converged infrastructure),resulting in a huge pool of compute and storage resources when clustered with other building ***
We study a natural type of repetitions in 2-dimensional strings. Such a repetition, called a matching frame, is a rectangular substring of size at least 2 × 2 with equal marginal rows and equal marginal columns. ...
详细信息
This paper addresses the problem of trajectory tracking of an inverted pendulum mounted on an autonomous quadrotor *** mathematical model of the quadrotor-inverted-pendulum system is first *** and angular velocity con...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
This paper addresses the problem of trajectory tracking of an inverted pendulum mounted on an autonomous quadrotor *** mathematical model of the quadrotor-inverted-pendulum system is first *** and angular velocity control laws are then constructed based on the backstepping technique;the former law features an implicit bound with respect to the position *** origin of the closed-loop system error associated with the proposed control methodology is shown to be locally asymptotically *** simulation results are presented to validate and demonstrate the performance of our solution.
暂无评论