In order to ensure the continuous, secure, and reliable network connection and coverage of the private network environment, the quality assurance requirements of different network states in different 5G private networ...
详细信息
Withthe rapid development of Internet technology, psychological education in colleges and universities is facing unprecedented challenges. the characteristics of the "Internet +" era have affected the menta...
详细信息
Detecting network intrusions is a crucial area of study in computer security research, withthe goal of identifying malicious activities in computer networks. Prior research has concentrated on utilizing machine learn...
Detecting network intrusions is a crucial area of study in computer security research, withthe goal of identifying malicious activities in computer networks. Prior research has concentrated on utilizing machine learning methods to spot network intrusions, typically by training models on distinct attack categories. In our study, we suggest a revised method that merges three attack categories into a unified category through supervised learning. this approach seeks to streamline the classification procedure and enhance the precision of network intrusion detection.
In recent years, withthe proliferation of cloud computing technology, companies have increasingly adopted cloud services. In particular, the need for DX business in the software industry has led to an increase in job...
In recent years, withthe proliferation of cloud computing technology, companies have increasingly adopted cloud services. In particular, the need for DX business in the software industry has led to an increase in job vacancies. the use of freelancers is a possible response to the shortage of jobs. An important consideration when a company chooses a freelancer is whether he or she can be trusted to get the job done on time. Such information cannot be derived from the submitted profile. this paper proposes a method to objectively assess the trustworthiness of freelancers. Moreover, a mechanism that prevents falsification of the evaluation is also considered. As a result, in the evaluation of the trust of freelancers, it was qualitatively shown that it is desirable to have a mechanism that prevents unauthorized use and falsification by applying digital signature withcloud environment to a third party's reference letter.
Withthe advent of advanced multi-sensor fusion models, there has been a notable enhancement in the performance of perception tasks within in terms of autonomous driving. Despite these advancements, the challenges per...
Withthe advent of advanced multi-sensor fusion models, there has been a notable enhancement in the performance of perception tasks within in terms of autonomous driving. Despite these advancements, the challenges persist, particularly in the fusion of data from cameras and LiDAR sensors. A critial concern is the accurate alignment of data from these disparate sensors. Our observations indicate that the projected positions of LiDAR points often misalign on the corresponding image. Furthermore, fusion models appear to struggle in accurately segmenting these misaligned points. In this paper, we would like to address this problem carefully, with a specific focus on the nuScenes dataset and the SOTA of fusion models 2DPASS, and providing the possible solutions or potential improvements.
Japan has recently been experiencing an ageing society, and the population of local areas is declining. therefore, it is necessary to promote local revitalization. the purpose of this research is to develop the touris...
Japan has recently been experiencing an ageing society, and the population of local areas is declining. therefore, it is necessary to promote local revitalization. the purpose of this research is to develop the tourism industry, which is one of the local revitalization measures. At the stage of tourism planning, it takes a lot of effort to build a tourist route by oneself. Namely, it is necessary to specify the purpose of travel from vague interest in travel and select tourist destinations accordingly. It is important to improve the satisfaction level according to the interests of individual tourists, considering the synergy effect that can be obtained by visiting and experiencing related tourist spots. this paper analyses the relationship between travel purposes based on vague interest in travel and proposes the framework of tourist route recommendation withthese relationships as the synergy effect.
In preparation for the post-coronavirus era, overseas exchanges are being revived. As a result, the potential desire to travel overseas will suddenly explode, and an increase in the number of tourists is expected in a...
In preparation for the post-coronavirus era, overseas exchanges are being revived. As a result, the potential desire to travel overseas will suddenly explode, and an increase in the number of tourists is expected in all regions. However, congestion at famous tourist destinations can lead to lower tourist satisfaction and missed opportunities from an economic perspective. the aim of our research is to guide people to nearby attractive tourist sites as a way of avoiding crowding at tourist sites. Specifically, from an economic perspective, the method is proposed to comprehensively evaluate alternative sites as candidates for the tourist sites one originally wants to visit, based on the similarity of tourist resources, interest, popularity and travel distance.
cloud infrastructure is efficient and scalable in all aspects;hence an enhanced method of safety measures is needed for secured data transfer. Security solution for cloud centric PC's was reliable in providing the...
详细信息
this research aims to introduce an innovative algorithm for processing point clouddata, a key technology in the Fourth Industrial Revolution. Point clouddata, which is used to accurately represent real-world objects...
this research aims to introduce an innovative algorithm for processing point clouddata, a key technology in the Fourth Industrial Revolution. Point clouddata, which is used to accurately represent real-world objects and environments, is often noisy due to environmental factors, which affects the accuracy and reliability of the data. the proposed algorithm effectively solves the noise problem to achieve high accuracy in data analysis and information extraction. the framework also combines the HNSW (Hierarchical Navigable Small World) index and the DBSCAN (Density-Based Spatial Clustering of Applications with Noise) clustering algorithm for efficient data retrieval and management in large data sets. these tools can be applied to various domains and have demonstrated robust performance in experiments. therefore, this research has the potential to drive innovation in the Fourth Industrial Revolution and is expected to serve as a practical tool for accurate data analysis and information extraction from large data sets.
Machine learning algorithms based on Deep Neural Networks (NN) have achieved remarkable results and are being extensively used in different domains. A crucial enabler for Artificial Intelligence is the quantum of data...
Machine learning algorithms based on Deep Neural Networks (NN) have achieved remarkable results and are being extensively used in different domains. A crucial enabler for Artificial Intelligence is the quantum of data, and these models are as good as the quality of datathat is used to train them. However, gathering data and using them to prognosticate behaviours presents great challenges to the privacy of individuals and organizations, such as data breaches, privacy loss, and the corresponding financial and reputational damages. Privacy-preserving machine learning (PPML) aims at bridging the gap between preserving privacy and reaping the benefits of ML. It is a key enabler for privatizing collected data and complying withdata protection regulations. the goal of the project is to implement a hybrid approach to Privacy Preserving AI by using these three Privacy Preserving techniques namely: Federated Learning, Differential Privacy, and Homomorphic Encryption to achieve maximum user data privacy while not affecting the overall accuracy of the predictions and computations made by the AI model.
暂无评论