The main aim of this survey is to provide wider insight about the use of MEMS (Micro-Electro-Mechanical-System) technology in various interdisciplinary fields. The areas include IoT (Internet-Of-Things) for smart auto...
详细信息
Graph structure expression plays a vital role in distinguishing various graphs. In this work, we propose a structure-sensitive graph dictionary embedding (SS-GDE) framework to transform input graphs into the embedding...
详细信息
Medical image segmentation (MIS) aims to finely segment various organs. It requires grasping global information from both parts and the entire image for better segmenting, and clinically there are often certain requir...
详细信息
For semantic branching in a two-branch network structure, it is crucial to quickly improve the feeling field, in addition, the feature fusion interaction of two-branching needs to take into account the structural and ...
详细信息
In recent years, the role of computational methods such as machine learning and deep learning has evolved to help better understand an individual’s response to drugs. Through advancements in the discipline of precisi...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
An open quantum battery(QB)model of a single qubit system charging in a coherent auxiliary bath(CAB)consisting of a series of independent coherent ancillae is *** to the collision charging protocol we derive a quantum...
详细信息
An open quantum battery(QB)model of a single qubit system charging in a coherent auxiliary bath(CAB)consisting of a series of independent coherent ancillae is *** to the collision charging protocol we derive a quantum master equation and obtain the analytical solution of QB in a steady *** find that the full charging capacity(or the maximal extractable work(MEW))of QB,in the weak QB-ancilla coupling limit,is positively correlated with the coherence magnitude of *** with the numerical simulations we compare with the charging properties of QB at finite coupling strength,such as the MEW,average charging power and the charging efficiency,when considering the bath to be a thermal auxiliary bath(TAB)and a CAB,*** find that when the QB with CAB,in the weak coupling regime,is in fully charging,both its capacity and charging efficiency can go beyond its classical counterpart,and they increase with the increase of coherence magnitude of *** addition,the MEW of QB in the regime of relative strong coupling and strong coherent magnitude shows the oscillatory behavior with the charging time increasing,and the first peak value can even be larger than the full charging MEW of *** also leads to a much larger average charging power than that of QB with TAB in a short-time charging *** features suggest that with the help of quantum coherence of CAB it becomes feasible to switch the charging schemes between the long-time slow charging protocol with large capacity and high efficiency and the short-time rapid charging protocol with highly charging power only by adjusting the coupling strength of *** work clearly demonstrates that the quantum coherence of bath can not only serve as the role of“fuel”of QB to be utilized to improve the QB's charging performance but also provide an alternative way to integrate the different charging protocols into a single QB.
The prevailing paradigm in 3D vision involves fully fine-tuning all the backbone parameters of pre-trained models. However, this approach poses challenges due to the large number of parameters requiring tuning, result...
详细信息
The prevailing paradigm in 3D vision involves fully fine-tuning all the backbone parameters of pre-trained models. However, this approach poses challenges due to the large number of parameters requiring tuning, resulting in unexpected storage demands. To address these issues and alleviate the computational cost and storage burden associated with full fine-tuning, we propose Point Cloud Prompt Tuning (PCPT) as an effective method for large Transformer models in point cloud processing. PCPT offers a powerful and efficient solution to mitigate the costs associated with full fine-tuning. Drawing inspiration from recent advancements in efficient tuning of large-scale language models and 2D vision models, PCPT leverages less than 0.05 % of trainable parameters, while keeping the pre-trained parameters of the Transformer backbone unchanged. To evaluate the effectiveness of PCPT, extensive experiments were conducted on four discriminative datasets (ModelNet40, few-shot ModelNet40, ScanObjectNN, ShapeNetPart) and four generation datasets (PCN, MVP, ShapeNet55, and ShapeNet34/Unseen21). The results demonstrate that the task-specific prompts utilized in PCPT enable the Transformer model to adapt effectively to the target domains, yielding results comparable to those obtained through other full fine-tuning methods. This highlights the versatility of PCPT across various domains and tasks. Our code is available at https://***/Fayeben/PCPT. IEEE
The hybrid flow shop group scheduling problem(HFGSP)with the delivery time windows has been widely studied owing to its better flexibility and suitability for the current just-in-time production ***,there are several ...
详细信息
The hybrid flow shop group scheduling problem(HFGSP)with the delivery time windows has been widely studied owing to its better flexibility and suitability for the current just-in-time production ***,there are several unresolved challenges in problem modeling and algorithmic design tailored for *** our study,we place emphasis on the constraint of ***,this paper first constructs a mixed integer linear programming model of HFGSP with sequence-dependent setup time and delivery time windows to minimize the total weighted earliness and tardiness(TWET).Then a penalty groups-assisted iterated greedy integrating idle time insertion(PG IG ITI)is proposed to solve the above *** the PG IG ITI,a double decoding strategy is proposed based on the earliest available machine rule and the idle time insertion rule to calculate the TWET ***,to reduce the amount of computation,a skip-based destruction and reconstruction strategy is designed,and a penalty groups-assisted local search is proposed to further improve the quality of the solution by disturbing the penalized groups,i.e.,early and tardy ***,through comprehensive statistical experiments on 270 test instances,the results prove that the proposed algorithm is effective compared to four state-of-the-art algorithms.
Medical image segmentation plays an important role in computer-aid diagnosis. In the past years, convolutional neural networks, especially the UNet-based architectures with symmetric U-shape encoder-decoder structure ...
详细信息
暂无评论