The matching and linear matroid intersection problems are solvable in quasi-NC, meaning that there exist deterministic algorithms that run in polylogarithmic time and use quasi-polynomially many parallel processors. H...
详细信息
To solve the nurse rostering problem, a problem that arises in every hospital on a daily basis, this study proposes a new method inspired by nature, similar to bee colony optimization. The difficulty of nurse rosterin...
详细信息
Speech recognition is an interdisciplinary field drawing from computerscience, linguistics, and computer engineering. Many modern devices have speech recognition functions in them to allow for easier. The demand for ...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
We have been developing MEIMAT (MEiji Microprocessor Architecture Design Tools). The MEIMAT is essentially designed to be able to represent any instruction of various processors by the MEIMAT meta-instruction in two w...
详细信息
The Internet of Vehicles (IoV), equipped with sensors, generates vast amounts of data, demanding rigorous computation and network. The cloud computing (CC) platform meets these stringent computation requirements, but ...
详细信息
Long-term desk work with lousy posture causes physical disabilities. To solve this problem, we have developed a smart chair with a controllable seat angle in our previous research. In order to control the seat angle a...
详细信息
In this note, a new structure of Right Coprime Factorization (RCF) for nonlinear systems with uncertainty has been proposed based on a time-varying Bezout identity. This is inspired from the concept of dilation from h...
详细信息
Training deep learning models typically requires a huge amount of labeled data which is expensive to acquire,especially in dense prediction tasks such as semantic ***,plant phenotyping datasets pose additional challen...
详细信息
Training deep learning models typically requires a huge amount of labeled data which is expensive to acquire,especially in dense prediction tasks such as semantic ***,plant phenotyping datasets pose additional challenges of heavy occlusion and varied lighting conditions which makes annotations more time-consuming to *** learning helps in reducing the annotation cost by selecting samples for labeling which are most informative to the model,thus improving model performance with fewer *** learning for semantic segmentation has been well studied on datasets such as PASCAL VOC and ***,its effectiveness on plant datasets has not received much *** bridge this gap,we empirically study and benchmark the effectiveness of four uncertainty-based active learning strategies on three natural plant organ segmentation *** also study their behaviour in response to variations in training configurations in terms of augmentations used,the scale of training images,active learning batch sizes,and train-validation set splits.
Wireless Sensor and Internet of Things (WSIoT) networks are characterized by nodes scattered throughout the environment, posing a significant challenge when it comes to battery replacement. The task of developing an a...
详细信息
暂无评论