期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Performance vs.Complexity Comparative Analysis of Multimodal Bilinear Pooling Fusion Approaches for Deep Learning-Based Visual Arabic-Question Answering Systems
1
作者 Sarah M.Kamel Mai A.Fadel +1 位作者 Lamiaa Elrefaei Shimaa I.Hassan 《Computer Modeling in Engineering & Sciences》 2025年第4期373-411,共39页
Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate... Visual question answering(VQA)is a multimodal task,involving a deep understanding of the image scene and the question’s meaning and capturing the relevant correlations between both modalities to infer the appropriate answer.In this paper,we propose a VQA system intended to answer yes/no questions about real-world images,in Arabic.To support a robust VQA system,we work in two directions:(1)Using deep neural networks to semantically represent the given image and question in a fine-grainedmanner,namely ResNet-152 and Gated Recurrent Units(GRU).(2)Studying the role of the utilizedmultimodal bilinear pooling fusion technique in the trade-o.between the model complexity and the overall model performance.Some fusion techniques could significantly increase the model complexity,which seriously limits their applicability for VQA models.So far,there is no evidence of how efficient these multimodal bilinear pooling fusion techniques are for VQA systems dedicated to yes/no questions.Hence,a comparative analysis is conducted between eight bilinear pooling fusion techniques,in terms of their ability to reduce themodel complexity and improve themodel performance in this case of VQA systems.Experiments indicate that these multimodal bilinear pooling fusion techniques have improved the VQA model’s performance,until reaching the best performance of 89.25%.Further,experiments have proven that the number of answers in the developed VQA system is a critical factor that a.ects the effectiveness of these multimodal bilinear pooling techniques in achieving their main objective of reducing the model complexity.The Multimodal Local Perception Bilinear Pooling(MLPB)technique has shown the best balance between the model complexity and its performance,for VQA systems designed to answer yes/no questions. 展开更多
关键词 Arabic-VQA deep learning-based VQA deep multimodal information fusion multimodal representation learning VQA of yes/no questions VQA model complexity VQA model performance performance-complexity trade-off
在线阅读 下载PDF
Quantum Secure Direct Intercommunication with Superdense Coding and Entanglement Swapping 被引量:1
2
作者 HUANG Da-Zu GUO Ying ZENG Gui-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第12期1290-1294,共5页
A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the sec... A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making ase of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping. 展开更多
关键词 quantum secure direct intercommunication entanglement swapping quantum cryptography
在线阅读 下载PDF
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 被引量:1
3
作者 何广强 朱思维 +1 位作者 郭红斌 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1263-1268,共6页
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon... For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 展开更多
关键词 quantum key distribution two-mode squeezed states optimal beam splitter attack
原文传递
Energy-Efficient Content-Based Routing in Internet of Things 被引量:1
4
作者 Samia Allaoua Chelloug 《Journal of Computer and Communications》 2015年第12期9-20,共12页
The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart... The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes. 展开更多
关键词 Internet of THINGS PUBLISH/SUBSCRIBE ROUTING CONTENT-BASED ROUTING Energy Virtual Topology OMNET++
在线阅读 下载PDF
Cyber Security Awareness among Students and Faculty Members in a Sudanese College 被引量:1
5
作者 Mohammed Daffalla Elradi Altigani Abd alraheem Altigani Osman Idriss Abaker 《Electrical Science & Engineering》 2020年第2期24-28,共5页
In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of b... In the last few years,cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide.A critical factor in reducing the possibility of being exploited is cyber security awareness.Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks.In this paper we conducted a survey that focuses on three vital security parameters,which are trust,passwords and defensive attitude respectively.The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour.56%of the participants are males and 44%are females.The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level.Nevertheless,faculty member showed better cyber security knowledge and skills by 8%higher than students.This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study. 展开更多
关键词 Cyber security AWARENESS PASSWORDS STUDENTS Faculty members
在线阅读 下载PDF
The dependence of fidelity on the squeezing parameter in teleportation of the squeezed coherent states
6
作者 张静涛 何广强 +1 位作者 任李杰 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期101-104,共4页
This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the telep... This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the teleported one is expressed in terms of the squeezing parameter r and the quantum channel parameter (two-mode squeezed state) p. The results of analysis show that the fidelity increases with the increase of the quantum channel parameter p, while the fidelity decreases with the increase of the squeezing parameter r of the squeezed state. Thus the coherent state (r= O) is the best quantum signal for continuous variable quantum teleportation once the quantum channel is built. 展开更多
关键词 quantum teleportation the squeezed coherent states FIDELITY
原文传递
A Novel Model of Resolving Contention in Optical Burst Switched Networks
7
作者 黄安鹏 Xie +6 位作者 Linzhen Li Jingcong Li Zhengbin Xu Anshi 《High Technology Letters》 EI CAS 2004年第4期6-10,共5页
A Novel segmentation and feedback model (SFM) applied to resolve collision has been proposed. The SFM is featured with Burst Segmentation and Prioritized Feedback (BSPF) that are used to provide quality of service (Qo... A Novel segmentation and feedback model (SFM) applied to resolve collision has been proposed. The SFM is featured with Burst Segmentation and Prioritized Feedback (BSPF) that are used to provide quality of service (QoS) and realize high throughput and faster switching in the optical burst switched networks. Simulation and performance analyses show that the SFM effectively avoid collision in optical burst switching (OBS). Long delay time of deflection routing and immature technology of wavelength converter and optical buffer are not employed in the SFM. The SFM not only realizes quick switching but also allows preemption for higher priority bursts. 展开更多
关键词 光脉冲转换 OBS 共享回馈频道 波长 SFM 节点 光学缓冲器 网络
在线阅读 下载PDF
Novel Node Structures for IP over WDM Networks
8
作者 李景聪 Wu +2 位作者 Deming Xu Anshi 《High Technology Letters》 EI CAS 2001年第4期35-38,共4页
IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures ca... IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures can be used as improvement approaches to DPDP (default path and dedicated path) method. The flow classifiers, which are the main components of these node structures, and the performance metrics of these structures, are also discussed. 展开更多
关键词 IP over WDM Node structure Optical crossconnect IP router
在线阅读 下载PDF
Design of 25-inch Direct Illumination-type LED Backlight
9
作者 LIANG Bao-wen LI Rong-yu GUO Ying-ying WANG Shuai CHEN Xiu-jin 《Semiconductor Photonics and Technology》 CAS 2008年第3期143-146,195,共5页
We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, ... We utilized "direct illumination-type" LED backlight project, made white-light LED array in rectangle, designed a sheet of reflective film, a sheet of diffuser and two sheets of brightness enhancement film, then analyzed illuminance chart which was the result of simulation in several distance between reflective film and optical film. It showed the best matching between illuminance and uniformity while in 25mm distance. Finally, we discussed some problems with thermal dispersion. 展开更多
关键词 BACKLIGHT LED DIRECT UNIFORMITY
在线阅读 下载PDF
Cycle-based protection for survivable WDM networks design
10
作者 张振荣 Yin Hongxi 《High Technology Letters》 EI CAS 2009年第1期88-93,共6页
A new integer linear program (ILP) formulation was developed to solve the problem of shared cycles design for optical networks with and without wavelength conversion. Numerical studies show that the shared cycles de... A new integer linear program (ILP) formulation was developed to solve the problem of shared cycles design for optical networks with and without wavelength conversion. Numerical studies show that the shared cycles design requires much lower redundancy compared with p-cycle design when the maximum number of spans allowed in the cycles is relatively small, but the difference in the redundancy between the two designs becomes smaller or disappears as the maximum number of spans allowed in the cycles increases. 展开更多
关键词 cycle-based protection integer linear program (ILP) wavelength division multiplexing (WDM)
在线阅读 下载PDF
Multi-state Quantum Teleportation via One Entanglement State
11
作者 GUO Ying ZENG Gui-Hua Moon Ho Lee 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第8期363-367,共5页
A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with co... A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quan- tum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates.In the present scheme,several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state.Two communication modes,i.e.,the detecting mode and the message mode,are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently.It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes. 展开更多
关键词 quantum teleporlation entanglement state
在线阅读 下载PDF
An Eavesdropping Detecting Approach Based on Mode-Mode Correlation
12
作者 熊锦 曾贵华 周南润 《Chinese Physics Letters》 SCIE CAS CSCD 2005年第11期2748-2750,共3页
We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacu... We find that second-order coherence as well as a Hanbury-Brown-Twiss intensity interferometer may provide an optimal approach for eavesdropping detection in the quantum key distribution based on two-mode squeezed vacuum states. With this approach, eavesdropping can be easily detected without sacrificing extra secret bits as the test key. In addition, the efficiency of the quantum key distribution protocol is enhanced greatly. 展开更多
关键词 VARIABLES
原文传递
Ransomware Attack:Rescue-checklist Cyber Security Awareness Program
13
作者 Mohammed Daffalla Elradi Mohamed Hashim Mohamed Mohammed Elradi Ali 《Artificial Intelligence Advances》 2021年第1期65-70,共6页
Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems and encrypt their files until they pay a ransom,usually in Bitcoin.Of course,that is the worst t... Ransomware attacks have been spreading broadly in the last few years,where attackers deny users’access to their systems and encrypt their files until they pay a ransom,usually in Bitcoin.Of course,that is the worst thing that can happen;especially for organizations having sensitive information.In this paper we proposed a cyber security awareness program intended to provide end-users with a rescue checklist in case of being attacked with a ransomware as well as preventing the attack and ways to recover from it.The program aimed at providing cyber security knowledge to 15 employees in a Sudanese trading and investment company.According to their cyber behaviour before the program,the participants showed a low level cyber security awareness that with 72%they are likely of being attacked by a ransomware from a phishing email,which is well known for spreading ransomware attacks.The results revealed that the cyber security awareness program greatly diminished the probability of being attacked by a ransomware with an average of 28%.This study can be used as a real-life ransomware attack rescue plan. 展开更多
关键词 Cyber security AWARENESS Ransomware attack Phishing email
在线阅读 下载PDF
Angular-modulated spatial distribution of ultrahigh-order modes assisted by random scattering
14
作者 阚雪芬 殷澄 +4 位作者 许田 陈凡 李建 韩庆邦 陈险峰 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第11期254-257,共4页
In designing an optical waveguide with metallic films on a nanometer scale, the random scattering by the natural roughness of the thin film is always ignored. In this paper, we demonstrate that for the ultrahigh-order... In designing an optical waveguide with metallic films on a nanometer scale, the random scattering by the natural roughness of the thin film is always ignored. In this paper, we demonstrate that for the ultrahigh-order modes(UOMs) in the symmetric metal cladding waveguide, such a scattering leads to drastic variations in their spatial distribution at different incident angles. Owing to the high mode density of the UOMs, the random scattering induced coupling can be easily related to different modes with different propagation directions or wavenumbers. At small incident angles, the intra-mode coupling dominates, which results in a spatial distribution in the form of concentric rings. At large incident angles, the inter-mode coupling plays the most important role and leads to an array-like pattern. Experimental evidence via optically trapped nanoparticles support the theoretical hypothesis. 展开更多
关键词 metallic waveguide random scattering optical trapping
原文传递
Cyber Security Professionals’Challenges:A Proposed Integrated Platform Solution
15
作者 Mohammed Daffalla Elradi Khalid Abass Abdelmajeed Mutaz Osman Abdulhaleem 《Electrical Science & Engineering》 2021年第2期1-6,共6页
As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide,cyber security professionals need to cope up with such a highly demanding environment.Security teams,such as Secur... As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide,cyber security professionals need to cope up with such a highly demanding environment.Security teams,such as Security operation Centre(SOC),Incident Response(IR)and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents;which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct,as these processes are time-consuming.In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow.The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%.This study can be used as a preliminary design for such an integrated platform. 展开更多
关键词 Cyber security THREAT INTELLIGENCE SOC IR
在线阅读 下载PDF
Recovery of Graded Index Profile of Planar Waveguide by Cubic Spline Function
16
作者 杨勇 陈险峰 +1 位作者 廖尉均 夏宇兴 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第2期318-321,共4页
A method is proposed to recover the refractive index profile of graded waveguide from the effective indices by a cubic spline interpolation function. Numerical analysis of several typical index distributions show that... A method is proposed to recover the refractive index profile of graded waveguide from the effective indices by a cubic spline interpolation function. Numerical analysis of several typical index distributions show that the refractive index profile can be reconstructed closely to its exact profile by the presented interpolation model. 展开更多
原文传递
Towards transparent 6G AI-RAN:A survey on explainable deep reinforcement learning for intelligent network slicing
17
作者 Shuaishuai Guo Yutong Zhong +2 位作者 Zhenyu Feng Shengqi Kang Jichao Chen 《Journal of Information and Intelligence》 2026年第1期23-37,共15页
The advent of the sixth generation(6G)wireless networks envisions an Artificial Intelligence(AI)-native Radio Access Network(AI-RAN),where Deep Reinforcement Learning(DRL)emerges as a key enabler for intelligent and a... The advent of the sixth generation(6G)wireless networks envisions an Artificial Intelligence(AI)-native Radio Access Network(AI-RAN),where Deep Reinforcement Learning(DRL)emerges as a key enabler for intelligent and autonomous network slicing.Despite the demonstrated performance gains of DRL-based solutions in dynamic resource allocation and slice orchestration,their opaque decision-making nature raises critical concerns regarding trust,accountability,and operational deployment.To bridge this gap,Explainable Deep Reinforcement Learning(XDRL)has recently attracted significant attention as a means to enhance transparency,interpretability,and controllability of AI-RAN slicing policies.This survey provides a comprehensive overview of the state of the art in explainable DRL for intelligent network slicing.We first review the fundamental principles of DRL in the context of RAN slicing and identify the unique explainability challenges posed by high-dimensional,multi-slice environments.We then categorize existing XDRL approaches into post-hoc explanation,symbolic abstraction,and human-in-the-loop steering,analyzing their methodologies,strengths,and limitations.Furthermore,we highlight benchmark environments and experimental testbeds that have been employed to evaluate XDRL in realistic network scenarios.Finally,we outline key open challenges,including scalability,generalization across traffic patterns,integration with Large Language Models(LLMs),and alignment with intent-based networking,and discuss promising research directions toward achieving transparent,trustworthy,and human-centric AI-RAN in 6G. 展开更多
关键词 Explainable Deep Reinforcement Learning(XDRL) 6G AI-RAN Intelligent network slicing Transparency and interpretability Intent-based networking
原文传递
Reversible storage of multiple light pulses in the EIT atomic medium 被引量:2
18
作者 祝曙光 徐安士 +3 位作者 张宇 郭弘 陈徐宗 吴德明 《Chinese Optics Letters》 SCIE EI CAS CSCD 2003年第11期680-682,共3页
In this paper, we first present a full numerical simulation for the trapping and retrieval procedure of eight continuing '1' Guassian pulses (i.e., '11111111') in the electromagnetically induced transp... In this paper, we first present a full numerical simulation for the trapping and retrieval procedure of eight continuing '1' Guassian pulses (i.e., '11111111') in the electromagnetically induced transparency (BIT) medium. This simulation shows that an BIT medium has the ability to store multiple light pulses in a shape-preserving way. And we also, for the first time, give the formula evaluating the maximum number of pulses that can be stored by an EIT medium at one time. This work reveals a new possible way to the reversible storage of the photonic information. 展开更多
关键词 EIT Reversible storage of multiple light pulses in the EIT atomic medium of in
原文传递
Proposal for simultaneous all-optical AND,NOR,and XNOR logic gates using QPM cascading nonlinear effects in two PPLNs 被引量:2
19
作者 唐喻斌 陈玉萍 +3 位作者 蒋淏苇 吉唯峰 吴依菁 陈险峰 《Chinese Optics Letters》 SCIE EI CAS CSCD 2013年第6期66-69,共4页
We propose AND, NOR, and XNOR logic gates realized simultaneously for 40-Gb/s networks, in which the realization of NOR and XNOR logic gates using only MgO-doped periodically poled lithium niobate (MgO: PPLN) is re... We propose AND, NOR, and XNOR logic gates realized simultaneously for 40-Gb/s networks, in which the realization of NOR and XNOR logic gates using only MgO-doped periodically poled lithium niobate (MgO: PPLN) is reported. In our configuration, we exploit broadband quasi-phase matching (QPM) cascaded sec- ond harmonic and difference-frequency generation (cSHG/DFG), cascaded sum-frequency and difference- frequency generation (cSFG/DFG) in one MgO:PPLN, and the narrow band QPM sum-frequency genera- tion (SFG) in another MgO:PPLN. The performance, including the quality-factor (Q-factor) and extinction ratio (ER), of the proposed multifunctional logic device is also simulated. 展开更多
关键词 Interferometry MAGNESIA
原文传递
Simple Raman scattering sensor integrated with a metallic planar optical waveguide: effective modulation via minor structural adjustment 被引量:1
20
作者 陆炎 阚雪芬 +4 位作者 许田 方靖淮 王孟 殷澄 陈险峰 《Chinese Optics Letters》 SCIE EI CAS CSCD 2018年第1期71-75,共5页
We report experimental realization of Raman spectra enhancement of copper phthalocyanine, using an on-chip metallic planar waveguide of the sub-millimeter scale. The oscillating ultrahigh order modes excited by the di... We report experimental realization of Raman spectra enhancement of copper phthalocyanine, using an on-chip metallic planar waveguide of the sub-millimeter scale. The oscillating ultrahigh order modes excited by the direct coupling method yield high optical intensity at resonance, which is different from the conventional strategy to create localized "hot spots." The observed excitation efficiency of the Raman signal is significantly enhanced,owing to the high Q factor of the resonant cavity. Furthermore, effective modulation of the Raman intensity is available by adjusting the polymethyl methacrylate(PMMA) thickness in the guiding layer, i.e., by tuning the light–matter interaction length. A large modulation depth is verified through the fact that 10 times variation in the enhancement factor is observed in the experiment as the PMMA thickness varies from 7 to 23 μm. 展开更多
关键词 Simple Raman scattering sensor integrated with a metallic planar optical waveguide effective modulation via minor structural adjustment
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部