This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provid...
详细信息
This paper explores a way of deploying the classical algorithm named genetic algorithm(GA) with the memristor. The memristor is a type of circuit device with both characteristics of storage and computing, which provides the similarity between electronic devices and biological components, such as neurons, and the structure of the memristor-based array is similar to that of chromosomes in genetics. Besides, it provides the similarity to the image gray-value matrix that can be applied to image restoration with GA. Thus, memristor-based GA is proposed and the experiment about image restoration using memristor-based GA is carried out in this paper. And parameters,such as the size of initial population and the number of iterations, are also set different values in the experiment,which demonstrates the feasibility of implementing GA with memristors.
With the popularity of speech and speaker recognition systems in recent years, voice interfaces are increasingly integrated into various Internet of Things (IoT) devices. However, studies have demonstrated that such s...
详细信息
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the *** this paper,we propose two secure and semantic retrieval schemes based on BERT(bidirectional encoder representations from transformers)named SSRB-1,*** training the documents with BERT,the keyword vector is generated to contain more semantic information of the documents,which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s ***,through testing on real data sets,it is shown that both of our solutions are feasible and effective.
Identifying the substrates of ubiquitin protein ligase (E3) and deubiquitinases (DUB) contributes to the discovery of potential therapeutic targets for diseases. However, experimental identification of E3/DUB-substrat...
详细信息
作者:
Baowei WangWen YouSchool of Computer
Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software
Nanjing University of Information Science and TechnologyNanjing210044China
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the f...
详细信息
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the fidelity of physical interactions and the realism of virtual environments,particularly within complex scenarios like virtual assembly,where both high precision and real-time responsiveness are *** ongoing developments,current CD techniques often fall short in meeting these stringent requirements,resulting in inefficiencies and inaccuracies that impede the overall performance of virtual assembly *** address these limitations,this study introduces a novel algorithm that leverages the capabilities of a Backpropagation Neural Network(BPNN)to optimize the structural composition of the Hybrid Bounding Volume Tree(HBVT).Through this optimization,the research proposes a refined Hybrid Hierarchical Bounding Box(HHBB)framework,which is specifically designed to enhance the computational efficiency and precision of CD *** HHBB framework strategically reduces the complexity of collision detection computations,thereby enabling more rapid and accurate responses to collision *** experimental validation within virtual assembly environments reveals that the proposed algorithm markedly improves the performance of CD,particularly in handling complex *** optimized HBVT architecture not only accelerates the speed of collision detection but also significantly diminishes error rates,presenting a robust and scalable solution for real-time applications in intricate virtual *** findings suggest that the proposed approach offers a substantial advancement in CD technology,with broad implications for its application in virtual reality,computer graphics,and related fields.
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie...
详细信息
Concept drift refers to the probability distribution of data generation changes over time in a data stream environment. In recent years, there has been an increasing interest in drift detection models. However, due to...
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and the ownership belongs to *** recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit *** order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate *** paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted *** the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical *** addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical *** the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the *** analysis and security analysis illustrate the completeness and feasibility of the scheme.
Deep learning models are widely used in healthcare. Given the large amount of data and the need for real-time processing, running these models on IoT devices is a viable solution. This study examines the impact of dee...
详细信息
暂无评论