2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D...
详细信息
With the growing maturity of the advanced edge-cloud collaboration and integrated sensing-communication-computing systems, edge intelligence has been envisioned as one of the enabling technologies for ubiquitous and l...
With the growing maturity of the advanced edge-cloud collaboration and integrated sensing-communication-computing systems, edge intelligence has been envisioned as one of the enabling technologies for ubiquitous and latency-sensitive machine learning based services in future wireless
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-poi...
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-point tracking and perturbation disturbances in the biochemical reaction process can be solved by a state feedback control strategy and a more stable and better dynamic performance of synthetic controllers. First, it is shown how a set of CRNs can provide state feedback to the biomolecular implementation of the H ∞ controller. Then, to facilitate the modularity of biochemical process design, CRNs of trigonometric functions and repetitive sequence step signals are defined for the first time as input signals to the controller. Finally, numerical simulation experiments are designed to verify the effectiveness of the whole scheme from several perspectives, such as setpoint tracking and external perturbations. The results show that the state feedback H ∞ molecular controller outperforms the conventional linear controller because it has a faster tracking response and better perturbation rejection performance.
Aiming at the problems of limited number and diversity in existing web server software, an active defense mechanism for web services based on automated software diversity is proposed, and the system framework and impl...
详细信息
MSC Codes 68T07, 68T10Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. Howeve...
详细信息
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo...
详细信息
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure cloud data sharing. An adaptively secure revocable broadcast encryption system with constant ciphertext and private key size under standard assumptions is more suitable for use in the cloud environment. Few existing revocable broadcast encryption schemes meet such a requirement. We propose a revocable broadcast encryption scheme with constant size ciphertext and private key by combining the RSA cryptographic accumulator with an efficient identity based encryption system. We prove it to be adaptively secure under standard assumptions using dual system encryption techniques.
Chirality is a widespread phenomenon in nature,where two non-superimposable enantiomers exist with one being the mirror image of the *** interplay between chirality and magnetism has recently drawn intensive interest ...
详细信息
Chirality is a widespread phenomenon in nature,where two non-superimposable enantiomers exist with one being the mirror image of the *** interplay between chirality and magnetism has recently drawn intensive interest in non-centrosymmetric magnetic materials absent of both spatial and time inversion symmetries[1].Among various chiral magnetic effects,the electrical manifestation of the magneto-chiral effect is crucial for both fundamental science and technological applications[2,3].The non-reciprocal resistance depending on the inner product of the magnetic field(H)and the current density U),termed the electrical magneto-chiral effect(eMChE),has recently been demonstrated in correlated oxides[4,5].
Due to the rise of 5G,IoT,AI,and high-performance computing applications,datacenter trafc has grown at a compound annual growth rate of nearly 30%.Furthermore,nearly three-fourths of the datacenter trafc resides withi...
详细信息
Due to the rise of 5G,IoT,AI,and high-performance computing applications,datacenter trafc has grown at a compound annual growth rate of nearly 30%.Furthermore,nearly three-fourths of the datacenter trafc resides within *** conventional pluggable optics increases at a much slower rate than that of datacenter *** gap between application requirements and the capability of conventional pluggable optics keeps increasing,a trend that is *** optics(CPO)is a disruptive approach to increasing the interconnecting bandwidth density and energy efciency by dramatically shortening the electrical link length through advanced packaging and co-optimization of electronics and *** is widely regarded as a promising solution for future datacenter interconnections,and silicon platform is the most promising platform for large-scale *** international companies(e.g.,Intel,Broadcom and IBM)have heavily investigated in CPO technology,an inter-disciplinary research feld that involves photonic devices,integrated circuits design,packaging,photonic device modeling,electronic-photonic co-simulation,applications,and *** review aims to provide the readers a comprehensive overview of the state-of-the-art progress of CPO in silicon platform,identify the key challenges,and point out the potential solutions,hoping to encourage collaboration between diferent research felds to accelerate the development of CPO technology.
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A...
详细信息
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir...
详细信息
暂无评论