The World health organization considers a mentally healthy person to be able to manage life’s stresses, work productively, and contribute to their communities. However, mental disorders, affecting 970 million people ...
详细信息
Channel coding in sixth-generation (6G) networks must attain exceptionally low bit error rate (BER), typically in the range of 10– 6 to 10– 9 , to ensure the requisite level of reliability. While fifth-generation (5...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Channel coding in sixth-generation (6G) networks must attain exceptionally low bit error rate (BER), typically in the range of 10– 6 to 10– 9 , to ensure the requisite level of reliability. While fifth-generation (5G) New Radio (NR) coding techniques have made substantial progress, the inherent limitations of the low error floor impede the attainment of such stringent BER targets. Compared to the low-density parity check (LDPC) codes employed in 5G communications, generalized low-density parity check (GLDPC) codes offer a more advantageous tradeoff between computational complexity and error correction performance in 6G networks. GLDPC codes enhance traditional LDPC structures by incorporating more complex local decoding units within their check nodes. When coupled with cryptographic techniques, GLDPC codes can establish a robust information security framework. In this paper, we propose a new security-based GLDPC that uses a number of BCH matrices for the GLDPC decoding process combined with the Kyber algorithm (BCH-based KyGLDPC) before transmitting data to increase reli-ability and solve the security problem against quantum computer attacks. The system's performance is assessed using both image data and data encrypted prior to transmission in a white additive Gaussian noise environment. The results indicate that the system provides strong error correction and data security.
Image recognition, powered by machine learning (ML), has significantly advanced applications in both dance movement recognition and robotic vision. This review examines key ML techniques, including Convolutional Neura...
详细信息
ISBN:
(数字)9798350356755
ISBN:
(纸本)9798350356762
Image recognition, powered by machine learning (ML), has significantly advanced applications in both dance movement recognition and robotic vision. This review examines key ML techniques, including Convolutional Neural Networks (CNNs), Deep Neural Networks (DNNs), Self-Organizing Maps (SOMs), and Long Short-Term Memory (LSTM) networks, alongside pose estimation methods like OpenPose and Part Affinity Fields (PAFs). These techniques enhance dance classification, real-time feedback, and motion analysis, with OpenPose + LSTMs and PAFs + LSTMs demonstrating the highest accuracy. Notwithstanding progress, obstacles such as high computational costs, data dependency, and real-time implementation challenges persist. Beyond dance, these methods are critical in robotic vision, intelligent automation, and industrial image processing, enabling autonomous robotic navigation, defect detection in manufacturing, and AI-driven motion tracking. By leveraging human movement analysis for robotics, ML improves human-robot interaction, robotic-assisted rehabilitation, and industrial automation. Despite progress, challenges such as high computational demands, data dependency, and real-time constraints remain. This review explores future directions, including multimodal data fusion, hybrid AI models, and real-time optimization, bridging the gap between AI-driven motion systems and intelligent automation to enhance adaptability and efficiency across domains.
The proceedings contain 76 papers. The topics discussed include: deep learning and deep thinking new application framework by CICT;identifying users and activities with cognitive signal processing from a wearable head...
ISBN:
(纸本)9781509038466
The proceedings contain 76 papers. The topics discussed include: deep learning and deep thinking new application framework by CICT;identifying users and activities with cognitive signal processing from a wearable headband;image-to-image face recognition using dual linear regression based classification and electoral college voting;design and implementation of user-oriented video streaming service based on machine learning;disaster-aware smart routing scheme based on symbiotic computing for highly-available information storage systems;zero-crossing analysis of LeÁvy walks for real-time feature extraction: composite signal analysis for strengthening the IoT against DDOS attacks;sentiment user profile analysis based on forgetting curve in mobile environments;an information theoretic criterion for adaptive multiobjective memetic optimization;a sparse temporal mesh model for brain decoding;a geometrical and logical unification of mind, light and matter;qualitative analysis of pre-performance routines in throwing using simple brain-wave sensor;simplification and visualization of brain network extracted from FMRI data using cerebra;an action guided constraint satisfaction technique for planning problem;and an efficient reduction algorithm based on natural neighbor and nearest enemy.
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent a...
详细信息
ISBN:
(纸本)9781509034840
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent and Zimmermann in their MCA book. The key techniques used in the refinement are D1 balancing, clear specification, remainder operation, and economical multiplication. The refined algorithm is more general, and gives exact and unique result. Numerical results show that these improvements are made without the cost of time efficiency. There is still the potential to further improve the efficiency by utilizing a short multiplication algorithm.
A cloud service selection model of the cloud service management system was proposed based on dynamic trustworthiness in order to select a trusted service which satisfies user's request from a lot of services with ...
详细信息
ISBN:
(纸本)9781509034840
A cloud service selection model of the cloud service management system was proposed based on dynamic trustworthiness in order to select a trusted service which satisfies user's request from a lot of services with similar or same functions. A service selection algorithm was proposed in order to select the closest classification for the user's requester. A trust evaluation mechanism was introduced, combined with direct trust and domain recommended trust. Then a service resource was selected among the requester's classification, which is trusted, When the transaction was completed, the service satisfaction was evaluated and the trust degree was updated. Simulation results show that the model can improve the service requesters' satisfaction and has certain resilience to intentional noncooperation.
computing resource utilization of applications may vary over time and inappropriate static resource provision would cause resource wastage or performance loss. Auto scaling based on instant demand is a simple solution...
详细信息
ISBN:
(纸本)9781509034840
computing resource utilization of applications may vary over time and inappropriate static resource provision would cause resource wastage or performance loss. Auto scaling based on instant demand is a simple solution but it also introduces latency of scaling. An accurate resource demand prediction algorithm is able to eliminate the side effects of scaling. To address this issue, we present CRUPA, a resource utilization prediction algorithm based on a time series analysis model (ARIMA) combined with Docker container technique. We also design a comparison experiment to evaluate the proposed algorithm and its average forecast error is only 6.5% in the short term, which is much lower than the most common model based on threshold (16.9%) on the same dataset. The result shows that CRUPA not only has high prediction accuracy but also scales the resource well.
暂无评论