|
|
|
Shubin Wang, Yuanyuan Chen and Zhang Yi
The structure and function of retinal vessels play a crucial role in diagnosing and treating various ocular and systemic diseases. Therefore, the accurate segmentation of retinal vessels is of paramount importance to assist a clinical diagnosis. U-Net ha...
ver más
|
|
|
|
|
|
|
Zach D. Merino, Jenny Farmer and Donald J. Jacobs
We present a novel nonparametric adaptive partitioning and stitching (NAPS) algorithm to estimate a probability density function (PDF) of a single variable. Sampled data is partitioned into blocks using a branching tree algorithm that minimizes deviation...
ver más
|
|
|
|
|
|
|
Yuxing Wang, Nan Liu, Zhiwen Pan and Xiaohu You
Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the sce...
ver más
|
|
|
|
|
|
|
Tao Zhou, Liang Luo, Yuanxin He, Zhiwei Fan and Shengchen Ji
The panel block is a quite important ?intermediate product? in the shipbuilding process. However, the assembly efficiency of the panel block assembly line is not high. Therefore, rational scheduling optimization is of great significance for improving shi...
ver más
|
|
|
|
|
|
|
Seung-Yong Lee and Minyoung Sung
Open platform communications (OPC) unified architecture (UA) is a communication standard increasingly used in industrial automation systems to enable the exchanging of control and management data between distributed entities. This paper proposes the desi...
ver más
|
|
|
|
|
|
|
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev
Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u...
ver más
|
|
|
|
|
|
|
Khumbelo Muthavhine and Mbuyu Sumbwanyambe
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist...
ver más
|
|
|
|
|
|
|
Liliya Akhmetzyanova
Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru...
ver más
|
|
|
|
|
|
|
Raúl Ulices Silva-Ávalos, Hugo Enrique Júnez-Ferreira, Julián González-Trinidad and Carlos Bautista-Capetillo
In Mexico, agriculture in semi-arid regions is highly dependent on groundwater resources, where most of the aquifers? characterization is a pending task. In particular, the depth to the basement is unknown for most of the Mexican territory. Hence, the de...
ver más
|
|
|
|
|
|
|
Viacheslav Moskalenko, Vyacheslav Kharchenko, Alona Moskalenko and Sergey Petrov
Modern trainable image recognition models are vulnerable to different types of perturbations; hence, the development of resilient intelligent algorithms for safety-critical applications remains a relevant concern to reduce the impact of perturbation on m...
ver más
|
|
|
|