Graph-based vision transformer with sparsity for training on small datasets from scratch [PDF]
Vision Transformers (ViTs) have achieved impressive results in large-scale image classification. However, when training from scratch on small datasets, there is still a significant performance gap between ViTs and Convolutional Neural Networks (CNNs ...
Peng Li +4 more
doaj +2 more sources
KEYS, LOCKING MECHANISMS AND PADLOCKS FROM THE OLD COLLECTIONS OF THE NATIONAL MUSEUM OF BANAT, FROM POJEJENA AND TIBISCUM [PDF]
The artefacts discussed in this article are related to keeping the privacy or security of properties and goods (keys, locking mechanisms, storage furniture, padlocks, handcuffs, some types of chains etc.).
Bogdan Lăpușan
doaj +1 more source
Seismic Performance of seat-type bridges with elastomeric bearings [PDF]
In Iran and some other countries, elastomer bearings in seat-type bridges are used with no sole/masonry plates and there is no positive connection between superstructure and substructure.
Mohammad Barkhordary, Saeed Tariverdilo
doaj +1 more source
CTIDH: faster constant-time CSIDH
This paper introduces a new key space for CSIDH and a new algorithm for constant-time evaluation of the CSIDH group action. The key space is not useful with previous algorithms, and the algorithm is not useful with previous key spaces, but combining the ...
Gustavo Banegas +7 more
doaj +1 more source
Keys to Successfully Choosing Enterprises That Suit Your Small Farm
HS-1121, an 11-page fact sheet by Robert Hochmuth, Larry Halsey, George Hochmuth, Chad Hutchinson, and Linda Landrum, helps farmers begin the decision-making process of evaluating alternative enterprises.
Robert Hochmuth +4 more
doaj +5 more sources
Special Subsets of Addresses for Blockchains Using the secp256k1 Curve
In 2020, Sala, Sogiorno and Taufer were able to find the private keys of some Bitcoin addresses, thus being able to spend the cryptocurrency linked to them.
Antonio J. Di Scala +3 more
doaj +1 more source
An Authenticated Key Agreement Scheme for Wireless Sensor Networks
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the private keys in each node.
Mee Loong Yang +2 more
doaj +1 more source
Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that
Rinki Rani +7 more
doaj +1 more source
Electronic identification keys for species with cryptic morphological characters: a feasibility study using some Thesium species [PDF]
The popularity of electronic identification keys for species identification has increased with the rapid technological advancements of the 21st century.
Natasha Lombard +2 more
doaj +3 more sources
Background Administration of moxidectin topically and doxycycline PO has been utilized experimentally as an alternative treatment for heartworm disease. However, clinical effects of this protocol remain poorly characterized.
Molly D. Savadelis +9 more
doaj +1 more source

