The underwater environment is complex and diverse, making it challenging to locate aquatic organisms accurately. The precise identification of underwater animals is crucial for ecological research and fisheries manage...
详细信息
In today's society, people increasingly need information acquisition due to the rapid development of science and technology and the consequent increase in available data. However, finding the information users nee...
详细信息
In recent years, infrared target detection has played a crucial role in intelligent transportation and assisted driving. Addressing the current issues of low detection accuracy, poor robustness, and missed detections ...
详细信息
The boundary conduction mode (BCM) flyback power factor correction (PFC) converter is well-suited for low to medium power-level applications. It isolates input and output voltages while improving the power factor (PF)...
详细信息
In comparison to centralised organisations with a single location structure, multi-location organisations face more challenges in the management of maintenance scheduling. In this paper, we present a new mathematical ...
详细信息
This review is a comprehensive description of adsorptive desulfurization (ADS) by metal-modified zeolites, particularly the elimination of sulfur compounds from gasoline, diesel, kerosene, jet fuel, and heavy petroleu...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
Missing values pose a formidable obstacle in multivariate time series analysis. Existing imputation methods rely on entangled representations that struggle to simultaneously capture multiple orthogonal time-series pat...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
We present models implemented by the IUST_NLPLAB group for ImageCLEFmedical Caption Task 2023. This task contains two subtasks: Concept Detection and Caption Prediction. Under the first subtask, the model should extra...
详细信息
暂无评论