K-Means, Decision Tree and Distance-Based algorithms are 3 important ways of classifying data. These three algorithms have different methods and focus on data classification. Therefore, they are always applied into di...
详细信息
Cloud computing technology is widely used in power grid systems. In response to the data with strict delay requirements and a large amount of data generated by the operation of the power grid system. New challenges ar...
详细信息
Since for all intents and purposes each sort of skin issue influences everybody consistently, dermatological sicknesses have been found to essentially affect the strength of millions of individuals. There is a require...
详细信息
In many organizations, machine learning and data mining techniques are used for analyzing large amount of available data’s, information’s for decision making process. In educational sector, Machine learning is used ...
详细信息
This research study explores the optimization of Intrusion Detection Systems (IDS) by fine-tuning hyperparameters for Deep Learning (DL) algorithms, incorporating data analytics. The research systematically analyzes t...
详细信息
Cloud computing is an emerging field due to its high performance, high availability, and low cost. The cloud offers numerous services. Cloud services major use case is data storage. Cloud provides to the customer mass...
详细信息
The development of cloud computing has met the growing demand for dataset search in the era of massive data. In the field of spatial dataset search, the high prevalence of sensitive information in spatial datasets und...
详细信息
ISBN:
(纸本)9798400704369
The development of cloud computing has met the growing demand for dataset search in the era of massive data. In the field of spatial dataset search, the high prevalence of sensitive information in spatial datasets underscores the necessity of privacy-preserving search processing in the cloud. However, existing spatial dataset search schemes are designed on plaintext datasets and do not consider privacy protection in search processing. In this paper, we first propose a privacy-preserving spatial dataset search scheme. The density distribution-based similarity model is proposed to measure the similarity between spatial datasets, and then the order-preserving encrypted similarity is designed to achieve secure similarity calculation. With the above idea, the baseline search scheme (PriDAS) is proposed. To improve the search efficiency, a two-layer index is designed to filter candidate datasets and accelerate the similarity calculation between datasets. By using the index, the optimized search scheme (PriDAS+) is proposed. To analyze the security of the proposed schemes, the game simulation-based proof is presented. Experimental results on three real-world spatial data repositories with 100,000 spatial datasets show that PriDAS+ only needs less than 0.4 seconds to accomplish the search processing.
The fifth edition of Sussex-Huawei Locomotion-Transportation (SHL) recognition challenge aims at determining the mode of locomotion and transportation of users using sensor-equipped devices. This recognition task reli...
详细信息
ISBN:
(纸本)9798400702006
The fifth edition of Sussex-Huawei Locomotion-Transportation (SHL) recognition challenge aims at determining the mode of locomotion and transportation of users using sensor-equipped devices. This recognition task relies on measurements captured from Inertial Measurement Unit and radio sensors placed on the user's hand, bag, hips and torso. The provided dataset presents several challenges, including its size, asynchronicity between the data types, lack of time continuity, and imbalanced distribution of the locomotion and transportation modes. To address these issues and enhance the recognition performance, our team, KDDI Research, performed data pre-processing and hand-crafted additional features. We explored different classifiers based on both Machine Learning or Deep Learning methods. Finally, the XGBoost Classifier model achieved the highest accuracy and f1-score across different validation datasets (bag, hands, hips, and torso). This model, used for our final submission on the testing dataset, achieved an average accuracy of 0.75 on these datasets.
The current base station management faces challenges such as imprecise information perception, a lack of precise prediction techniques for load and energy consumption, and the absence of refined optimization methods f...
详细信息
ISBN:
(纸本)9798400708305
The current base station management faces challenges such as imprecise information perception, a lack of precise prediction techniques for load and energy consumption, and the absence of refined optimization methods for multi-source comprehensive scheduling. It can only achieve a quantitative complementarity of energy on the supply side, the grid side, and the load side, without considering the differences in energy quality of various forms of energy and their optimal scheduling in conversion, transmission, storage, and utilization. Simultaneously, there is a severe deficiency in crowss-temporal and spatial allocation and utilization of energy, as well as the use of edge computing and big data analytics for precise prediction and optimization scheduling. This has resulted in low overall energy utilization efficiency, high carbon emissions, and other issues. There is an urgent need to break through the key technologies of accurate perception, precise prediction, precise scheduling, and fine control in the energy Internet of Things system for base stations. The project team has put forth a scientifically sound solution, addressing issues related to precise perception of base station status, accurate load prediction, fine optimization of energy management, and precise control of comprehensive energy systems. They have proposed the "Uncertain dataprocessing Algorithm for Base Station Energy Consumption" to tackle and solve the challenge of precise load prediction in energy IoT based on high-noise, low-quality data.
How to maximize embedding capacity is one of the current challenges in the field of reversible data hiding. A reversible data hiding scheme is proposed based on the rearrangement and compression of prediction error bi...
详细信息
暂无评论