Secure Hash Algorithm 3 (SHA-3) is a crucial component in modern cryptographic systems, particularly in applications demanding high security and efficiency. For example, it is vital in System-on-Chip (SoC) application...
详细信息
In existing remote sensing image retrieval(RSIR)datasets,the number of images among different classes varies dramatically,which leads to a severe class imbalance *** studies propose to train the model with the ranking...
详细信息
In existing remote sensing image retrieval(RSIR)datasets,the number of images among different classes varies dramatically,which leads to a severe class imbalance *** studies propose to train the model with the ranking‐based metric(e.g.,average precision[AP]),because AP is robust to class ***,current AP‐based methods overlook an important issue:only optimising samples ranking before each positive sample,which is limited by the definition of AP and is prone to local *** achieve global optimisation of AP,a novel method,namely Optimising Samples after positive ones&AP loss(OSAP‐Loss)is proposed in this ***,a novel superior ranking function is designed to make the AP loss differentiable while providing a tighter upper ***,a novel loss called Optimising Samples after Positive ones(OSP)loss is proposed to involve all positive and negative samples ranking after each positive one and to provide a more flexible optimisation strategy for each ***,a graphics processing unit memory‐free mechanism is developed to thoroughly address the non‐decomposability of AP *** experimental results on RSIR as well as conventional image retrieval datasets show the superiority and competitive performance of OSAP‐Loss compared to the state‐of‐the‐art.
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
In this paper, a novel algorithm had been proposed to improve the efficiency performance of the wind energy conversion system (WECS) to reach the maximum possible captured power under fast varying wind speed. The perm...
详细信息
This manuscript presents a hybrid method for optimal energy management in smart home appliances. The proposed approach combines the Ebola Optimization Search Algorithm (EOSA) with the performance of spiking neural net...
详细信息
In this paper, a multiband miniaturized crescent-shaped patch antenna with circular slots is presented for ultra-wideband applications. The proposed antenna is constructed on a Flame Retardant 4 (FR-4) dielectric subs...
详细信息
This article presents a nonlinear dynamic inversion-based motion plan for a levitating robotic satellite emulation platform. The frictionless motion of such a levitating platform has dynamic equivalency with a satell...
详细信息
Coverage hole restoration and connectivity is a typical problem for underwater wireless sensor networks. In underwater applications like underwater oilfield reservoirs, undersea minerals and monitoring etc., where nod...
详细信息
The COVID-19 pandemic has been scattering speedily around the world since 2019. Due to this pandemic, human life is becoming increasingly involutes and complex. Many people have died because of this virus. The lack of...
详细信息
Image data has been increasingly generated by cameras as well as acquisition modalities. Image data is diverse and has different sensitive levels. Encryption algorithms for massive image data are required not only hig...
详细信息
暂无评论