With the rapid development of Large Language Model (LLM) technology, it has become an indispensable force in biomedical data analysis research. However, biomedical researchers currently have limited knowledge about LL...
详细信息
An open quantum battery(QB)model of a single qubit system charging in a coherent auxiliary bath(CAB)consisting of a series of independent coherent ancillae is *** to the collision charging protocol we derive a quantum...
详细信息
An open quantum battery(QB)model of a single qubit system charging in a coherent auxiliary bath(CAB)consisting of a series of independent coherent ancillae is *** to the collision charging protocol we derive a quantum master equation and obtain the analytical solution of QB in a steady *** find that the full charging capacity(or the maximal extractable work(MEW))of QB,in the weak QB-ancilla coupling limit,is positively correlated with the coherence magnitude of *** with the numerical simulations we compare with the charging properties of QB at finite coupling strength,such as the MEW,average charging power and the charging efficiency,when considering the bath to be a thermal auxiliary bath(TAB)and a CAB,*** find that when the QB with CAB,in the weak coupling regime,is in fully charging,both its capacity and charging efficiency can go beyond its classical counterpart,and they increase with the increase of coherence magnitude of *** addition,the MEW of QB in the regime of relative strong coupling and strong coherent magnitude shows the oscillatory behavior with the charging time increasing,and the first peak value can even be larger than the full charging MEW of *** also leads to a much larger average charging power than that of QB with TAB in a short-time charging *** features suggest that with the help of quantum coherence of CAB it becomes feasible to switch the charging schemes between the long-time slow charging protocol with large capacity and high efficiency and the short-time rapid charging protocol with highly charging power only by adjusting the coupling strength of *** work clearly demonstrates that the quantum coherence of bath can not only serve as the role of“fuel”of QB to be utilized to improve the QB's charging performance but also provide an alternative way to integrate the different charging protocols into a single QB.
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
The hybrid flow shop group scheduling problem(HFGSP)with the delivery time windows has been widely studied owing to its better flexibility and suitability for the current just-in-time production ***,there are several ...
详细信息
The hybrid flow shop group scheduling problem(HFGSP)with the delivery time windows has been widely studied owing to its better flexibility and suitability for the current just-in-time production ***,there are several unresolved challenges in problem modeling and algorithmic design tailored for *** our study,we place emphasis on the constraint of ***,this paper first constructs a mixed integer linear programming model of HFGSP with sequence-dependent setup time and delivery time windows to minimize the total weighted earliness and tardiness(TWET).Then a penalty groups-assisted iterated greedy integrating idle time insertion(PG IG ITI)is proposed to solve the above *** the PG IG ITI,a double decoding strategy is proposed based on the earliest available machine rule and the idle time insertion rule to calculate the TWET ***,to reduce the amount of computation,a skip-based destruction and reconstruction strategy is designed,and a penalty groups-assisted local search is proposed to further improve the quality of the solution by disturbing the penalized groups,i.e.,early and tardy ***,through comprehensive statistical experiments on 270 test instances,the results prove that the proposed algorithm is effective compared to four state-of-the-art algorithms.
Event cameras encode visual information by generating asynchronous and sparse event streams, which hold great potential for low latency and low power consumption. Despite many successful implementations of event camer...
Medical image segmentation plays an important role in computer-aid diagnosis. In the past years, convolutional neural networks, especially the UNet-based architectures with symmetric U-shape encoder-decoder structure ...
详细信息
The prevailing paradigm in 3D vision involves fully fine-tuning all the backbone parameters of pre-trained models. However, this approach poses challenges due to the large number of parameters requiring tuning, result...
详细信息
The prevailing paradigm in 3D vision involves fully fine-tuning all the backbone parameters of pre-trained models. However, this approach poses challenges due to the large number of parameters requiring tuning, resulting in unexpected storage demands. To address these issues and alleviate the computational cost and storage burden associated with full fine-tuning, we propose Point Cloud Prompt Tuning (PCPT) as an effective method for large Transformer models in point cloud processing. PCPT offers a powerful and efficient solution to mitigate the costs associated with full fine-tuning. Drawing inspiration from recent advancements in efficient tuning of large-scale language models and 2D vision models, PCPT leverages less than 0.05 % of trainable parameters, while keeping the pre-trained parameters of the Transformer backbone unchanged. To evaluate the effectiveness of PCPT, extensive experiments were conducted on four discriminative datasets (ModelNet40, few-shot ModelNet40, ScanObjectNN, ShapeNetPart) and four generation datasets (PCN, MVP, ShapeNet55, and ShapeNet34/Unseen21). The results demonstrate that the task-specific prompts utilized in PCPT enable the Transformer model to adapt effectively to the target domains, yielding results comparable to those obtained through other full fine-tuning methods. This highlights the versatility of PCPT across various domains and tasks. Our code is available at https://***/Fayeben/PCPT. IEEE
Label biases in facial expression recognition (FER) datasets, caused by annotators' subjectivity, pose challenges in improving the performance of target datasets when auxiliary labeled data are used. Moreover, tra...
详细信息
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission *** Body Sensor Network(BSN)systems,biosensors communi...
详细信息
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission *** Body Sensor Network(BSN)systems,biosensors communicate with receiving devices through relay nodes to improve their limited energy *** the relay node fails,the biosensor can communicate directly with the receiving device by releasing more transmitting ***,if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device,the biosensor will be isolated by the ***,a new combinatorial analysis method is proposed to analyze the influence of random isolation time(RIT)on system reliability,and the competition relationship between biosensor isolation and propagation failure is *** approach inherits the advantages of common combinatorial algorithms and provides a new approach to effectively address the impact of RIT on system reliability in IoT systems,which are affected by competing ***,the method is applied to the BSN system,and the effect of RIT on the system reliability is analyzed in detail.
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
暂无评论