The Formula Student Driverless discipline is a race car competition for university students competing with self-constructed autonomous vehicle to race in the tracks without the help of human race car drivers. This pap...
详细信息
ISBN:
(数字)9798331505974
ISBN:
(纸本)9798331505981
The Formula Student Driverless discipline is a race car competition for university students competing with self-constructed autonomous vehicle to race in the tracks without the help of human race car drivers. This paper aims to investigate the development of the perception system using computer vision technique in different frameworks for the Herkules Racing Team (HRT) which is the Formula Student team of the university of Kassel.
This paper considers data secrecy in distributed storage systems (DSSs) using maximally recoverable locally repairable codes (MR-LRCs). Conventional MR-LRCs are in general not secure against eavesdroppers who can obse...
详细信息
Mesoscale eddies are dynamic oceanic phenomena significantly influencing marine ecosystems' energy transfer, nutrients, and biogeochemical cycles. These eddies' precise identification and categorization can im...
详细信息
As the nascent field of quantum computing develops, an increasing number of quantum hardware modalities, such as superconducting electronic circuits, semiconducting spins, trapped ions, and neutral atoms, have become ...
As the nascent field of quantum computing develops, an increasing number of quantum hardware modalities, such as superconducting electronic circuits, semiconducting spins, trapped ions, and neutral atoms, have become available for performing quantum computations. These quantum hardware modalities exhibit varying characteristics and implement different universal quantum gate sets that may e.g. contain several distinct two-qubit quantum gates. Adapting a quantum circuit from a, possibly hardware-agnostic, universal quantum gate set to the quantum gate set of a target hardware modality has a crucial impact on the fidelity and duration of the intended quantum computation. However, current quantum circuit adaptation techniques only apply a specific decomposition or allow only for local improvements to the target quantum circuit potentially resulting in a quantum computation with less fidelity or more qubit idle time than necessary. These issues are further aggravated by the multiple options of hardware-native quantum gates rendering multiple universal quantum gates sets accessible to a hardware modality. In this work, we developed a satisfiability modulo theories model that determines an optimized quantum circuit adaptation given a set of allowed substitutions and decompositions, a target hardware modality and the quantum circuit to be adapted. We further discuss the physics of the semiconducting spins hardware modality, show possible implementations of distinct two-qubit quantum gates, and evaluate the developed model on the semiconducting spins hardware modality. Using the developed quantum circuit adaptation method on a noisy simulator, we show the Hellinger fidelity could be improved by up to 40 % and the qubit idle time could be decreased by up to 87 % compared to alternative quantum circuit adaptation techniques.
Intent-Based Networking (IBN) aims to automate administrative and management tasks in future communications networks. By leveraging networking concepts such as network abstractions and data-plane programmability and u...
Intent-Based Networking (IBN) aims to automate administrative and management tasks in future communications networks. By leveraging networking concepts such as network abstractions and data-plane programmability and using artificial intelligence (AI), IBN improves the overall efficiency of communications networks. IBN employs a closed-loop architecture to monitor and optimize real-time network performance, reduce human intervention, and enhance resilience. However, the paradigm and the technological enablers introduce security challenges. This article studies the security gains and challenges in IBN from the aspect of enabling concepts and technologies. Furthermore, the article highlights potential solutions to existing challenges, outlines the standardization efforts, and summarizes the most important research gaps to advance future research in this direction.
Evaporation from a porous medium partially saturated with saline water, causes the salinity (salt concentration) to increase near the top of the porous medium as water leaves while salt stays behind. As the density of...
详细信息
This paper presents an enhanced dual transmission-line method for evaluating the dielectric properties of known and unknown materials, significantly improving upon traditional techniques. The proposed method simplifie...
详细信息
ISBN:
(数字)9798331512620
ISBN:
(纸本)9798331512637
This paper presents an enhanced dual transmission-line method for evaluating the dielectric properties of known and unknown materials, significantly improving upon traditional techniques. The proposed method simplifies the experimental setup by eliminating the need for constructing transmission lines or additional processing on unknown materials, utilizing a straightforward simulation model created with the EM simulator CST and requiring only low-cost experimental equipment. It operates independently of prior knowledge concerning the substrate dielectric constant, streamlining data processing and saving time. Furthermore, the method demonstrates high accuracy in comparison to reference values. Applied in this study, it verified the dielectric properties of unknown cowhide leather and two commercial substrates, RO3010 and RT5880. The computed root-mean-square errors (RMSEs) were 24.1% for RT5880 and 3% for RO3010, confirming the method's effectiveness. Overall, this improved approach provides a reliable and efficient alternative for material characterization in dielectric property determination.
Conventional methods for diagnosing bridge damage have centred on tracking changes in modal-based Damage Sensitive Features (DSFs), which are strongly related to structural stiffness. Environmental and operational var...
详细信息
As the nascent field of quantum computing develops, an increasing number of quantum hardware modalities, such as superconducting electronic circuits, semiconducting spins, trapped ions, and neutral atoms, have become ...
详细信息
Infrastructure as Code (IaC) enables developers and operations teams to automatically deploy and manage an IT infrastructure via software. Among other uses, IaC is widely used in the context of continuously released d...
详细信息
ISBN:
(数字)9781665481465
ISBN:
(纸本)9781665481472
Infrastructure as Code (IaC) enables developers and operations teams to automatically deploy and manage an IT infrastructure via software. Among other uses, IaC is widely used in the context of continuously released deployments such as those of microservice and other cloud-based systems. Although IaC-based deployments have been utilized by many companies, there are no approaches on checking their conformance to architectural aspects yet. In this paper, we focus on security-related practices including observability, access control, and traffic control in IaC-based deployments. While best practices for this topic have been documented in some gray literature sources such as practitioners’ blogs and public repositories, approaches enabling automated checking of conformance to such best practices do not yet exist. We propose a model-based approach based on generic, technology-independent metrics, tied to typical architectural design decisions on IaC-based deployments. With this approach, we can measure conformance to security-related practices. We demonstrate and assess the validity and appropriateness of these metrics in assessing a system’s conformance to practices through regression analysis.
暂无评论