In the fields of information security, the application of random numbers is becoming more and more widespread. True random numbers (TRNs) tend to have better randomness and unpredictability than pseudo random numbers ...
详细信息
The interpretability of the convolutional neural networks(CNNs) has become a research hotspot. A popular explanation method is based on Class Activation Mapping (CAM), which visualizes the salient regions most relevan...
详细信息
In this paper, a semi-fragile watermark solution based on quantization index modulation in the wavelet region was proposed. The algorithm employs a compressed halftoned binary image as watermark and embeds it in the w...
详细信息
In this paper, an omni-directional walking-aid robot is developed to assist the elderly in the daily living movements. A motion control strategy of walking-aid robot based on the observation of the human status throug...
详细信息
Owing to the weaknesses of existing correlation detection methods in digital fingerprint matching, such as difficult to determine the threshold and low matching accuracy rate, a method proposed in digital fingerprint ...
详细信息
This paper proposed a H∞ based controller design method for MIMO system. We use the bound real lemma to design the controller when the reference model is given. The BMI (Bi-linear Matrix Inequality) problem is turned...
详细信息
Due to its high degree of customization, DNA origami provides a versatile platform with which to engineer nanoscale structures and devices. Reconfigurable nanodevices driven by DNA strand displacement accomplish the t...
详细信息
Alzheimer's disease (AD) is the most prevalent form of dementia, and early diagnosis is crucial for delaying and treating AD. Resting-state functional magnetic resonance imaging (rs-fMRI), a widely used medical im...
详细信息
Emotion Detection in Conversation (EDC) has been implemented in numerous domains and is under increasing attention. The EDC task is highly challenging due to the need to incorporate both the context of the utterance a...
详细信息
Traditional recurrent neural networks are composed of capacitors, inductors, resistors, and operational *** neural networks are constructed by replacing resistors with memristors. This paper focuses on the memory anal...
详细信息
Traditional recurrent neural networks are composed of capacitors, inductors, resistors, and operational *** neural networks are constructed by replacing resistors with memristors. This paper focuses on the memory analysis,i.e. the initial value computation, of memristors. Firstly, we present the memory analysis for a single memristor based on memristors’ mathematical models with linear and nonlinear ***, we present the memory analysis for two memristors in series and parallel. Thirdly, we point out the difference between traditional neural networks and those that are memristive. Based on the current and voltage relationship of memristors, we use mathematical analysis and SPICE simulations to demonstrate the validity of our methods.
暂无评论