Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts...
Blockchain technology has the potential to disrupt the banking and financial sector, even if existing institutions are unable to benefit from it. Most banks are looking to use blockchain technology for smart contracts, payments, and trading platforms in order to reduce fraud, secure and expedite transactions, cut costs, increase data quality, and enable Know Your Customer (KYC). In recent years, blockchain has gained a lot of attention as one of the most popular ways to secure data transfer through decentralized peer-to-peer systems. Blockchain is an immutable ledger that enables secure, decentralized transaction execution. This complex yet secure system has a stellar reputation and is attracting a growing number of clients. This paper proposes a new conceptual framework for using mobile payment blockchain technology to address the needs of customers (both consumers and business owners) for faster, safer, more affordable, real-time, and secure payments that also eliminate the need for intermediary parties to approve and reconcile transactions. The framework reduces operational risk by ensuring the transparency and immutability of all transactions.
A refractive index(RI)sensor based on elliptical core photonic crystal fiber(EC-PCF)has been *** asymmetric elliptical core introduces the polarization-dependent characteristics of the fiber core *** performances of i...
详细信息
A refractive index(RI)sensor based on elliptical core photonic crystal fiber(EC-PCF)has been *** asymmetric elliptical core introduces the polarization-dependent characteristics of the fiber core *** performances of intermodal interference between the intrinsic polarization fiber core modes are investigated by contrast in two interferometers based on the Mach-Zehnder(M-Z)and Sagnac interference *** addition,the RI sensing characteristics of the two interferometers are studied by successively filling the three layers air holes closest to the elliptical core in the *** results show that the M-Z interference between LP_(01)and LP_(11)mode in the same polarized direction is featured with the incremental RI sensing sensitivity as the decreasing interference length,and the infilled scope around the elliptical core has a weak correlation with the RI sensing *** to the high birefringence of LP11 mode,the Sagnac interferometer has better RI sensing performance,the maximum RI sensing sensitivity of 12000 nm/RIU is achieved under the innermost one layer air holes infilled with RI matching liquid of RI=1.39 at the pre-setting EC-PCF length of 12 cm,which is two orders of magnitude higher than the M-Z interferometer with the same fiber *** series of theoretical optimized analysis would provide guidance for the applications in the field of biochemical sensing.
Estimating depth maps from monocular underwater images poses one of the most challenging problems in underwater applications. Due to the lack of large-scale paired underwater color-depth datasets for effective trainin...
详细信息
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for exist...
详细信息
ISBN:
(数字)9798400702174
ISBN:
(纸本)9798350382143
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for existing approaches is that given a code snippet, they can only generate one comment while developers usually need to know information from diverse perspectives such as what is the functionality of this code snippet and how to use it. To tackle this limitation, this study empirically investigates the feasibility of utilizing large language models (LLMs) to generate comments that can fulfill developers' diverse intents. Our intuition is based on the facts that (1) the code and its pairwise comment are used during the pre-training process of LLMs to build the semantic connection between the natural language and programming language, and (2) comments in the real-world projects, which are collected for the pre-training, usually contain different developers' intents. We thus postulate that the LLMs can already understand the code from different perspectives after the pre-training. Indeed, experiments on two large-scale datasets demonstrate the rationale of our insights: by adopting the in-context learning paradigm and giving adequate prompts to the LLM (e.g., providing it with ten or more examples), the LLM can significantly outperform a state-of-the-art supervised learning approach on generating comments with multiple intents. Results also show that customized strategies for constructing the prompts and post-processing strategies for reranking the results can both boost the LLM's performances, which shed light on future research directions for using LLMs to achieve comment generation.
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o...
详细信息
In the era of Internet of Things (IoT) and Federated Learning (FL), where distributed training models are essential, the FL paradigm has come into the spotlight for researchers. However, the inconsistency in the sourc...
详细信息
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitor...
Recently Smart Home concept has been a popular choice as a solution for emerging security related problems. The primary objective of this research was to create a cyber-threat free fully functioning smart home monitoring and anti-theft alarming system with enhanced physical security mechanisms. The focus of this research was to create a holistic and secure smart home system, combining cutting-edge physical security measures. The study introduced novel Intruder Access Prevention methods rooted in human behavior and voice pattern recognition, while also incorporating blockchain and network traffic analysis to safeguard the homeowner's data. Furthermore, a pioneering voice-controlled monitoring mechanism, utilizing protective energy-saving plug technology, was devised to enhance safety within contemporary households. The human behavior recognition and voice recognition-based intruder access prevention system demonstrated over 80% accuracy in intruder prevention, while user data protection mechanism prevents the communication channel from cyber hackings. Further, the smart plug demonstrates reliable and accurate physical environment monitoring with minimum latency. These results underscore the system's significant contribution to home security, marking a noteworthy advancement in the Smart Home concept.
The transition kernel of a continuous-state-action Markov decision process (MDP) admits a natural tensor structure. This paper proposes a tensor-inspired unsupervised learning method to identify meaningful low-dimensi...
The transition kernel of a continuous-state-action Markov decision process (MDP) admits a natural tensor structure. This paper proposes a tensor-inspired unsupervised learning method to identify meaningful low-dimensional state and action representations from empirical trajectories. The method exploits the MDP's tensor structure by kernelization, importance sampling and low-Tucker-rank approximation. This method can be further used to cluster states and actions respectively and find the best discrete MDP abstraction. We provide sharp statistical error bounds for tensor concentration and the preservation of diffusion distance after embedding. We further prove that the learned state/action abstractions provide accurate approximations to latent block structures if they exist, enabling function approximation in downstream tasks such as policy evaluation.
A wide range of respiratory diseases, such as cold and flu, asthma, and COVID-19, affect people’s daily lives worldwide. In medical practice, respiratory sounds are widely used in medical services to diagnose various...
详细信息
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence ...
详细信息
ISBN:
(数字)9798350379433
ISBN:
(纸本)9798350379440
Attacks on multimedia files by malicious users have become quite common, especially with the increase in the number of editing tools and their ease of use. Considering that such files can now be used both as evidence and for social visibility in all kinds of environments, it has become important to prove their authenticity. With the proposed method, the detection of merging forgeries in audio files has been carried out. For this purpose, the audio files received from the input are converted into cochleagram images. The PVTv2 based deep network architecture is trained with the generated cochleagram images. As a result of the training, the suspicious audio file given as input is labelled as original/fake. The proposed method gives 96.11% accuracy for 2s database, 94.63% accuracy for 3s database and 95.19% accuracy for 2s-3s database.
暂无评论