Modern computing applications increasingly rely on technologies in artificial intelligence, machine learning, and bigdata analytics. These applications often demand more powerful and energy-efficient hardware. Resist...
详细信息
ISBN:
(纸本)9781665460903
Modern computing applications increasingly rely on technologies in artificial intelligence, machine learning, and bigdata analytics. These applications often demand more powerful and energy-efficient hardware. Resistive switching random access memory (ReRAM) has emerged as a promising solution to satisfy both the storage and computing needs. In this paper, a natural organic honey film embedded with carbon nanotube (CNT) was fabricated into a resistive switching device, and the resistive switching behaviors were investigated. Endurance test results show the cycle-to-cycle variation of set and reset voltages. On/Off ratio in retention test was found to be in the order of similar to 10(5) which proves its potential as a non-volatile memory device to support neuromorphic computing applications. This research opens up opportunities to execute bigdata and machine learning applications with modest energy consumption and minimal electronic waste.
This article provides a comprehensive definition of bigdata and focuses on the current status and development trends of bigdata hardware and software infrastructure by comprehensively summarizing relevant research a...
详细信息
Artificial intelligence (AI) has been widely studied. Due to the increasingly wide application of multi-class data, with the characteristics of rapid arrival, rapid change, huge quantity, and potential infinity, the o...
详细信息
The application of computer bigdata technology in education is an inevitable technology trend leading to educational reform. The wide application of bigdata technology has brought new development opportunities to En...
详细信息
Measuring core body temperature has significant implications in various fields, including healthcare, sports medicine, and military operations. Existing core body temperature measurement, such as rectal and esophageal...
详细信息
The eight papers in this special section were presented at the Sixteenth internationalconference on Intelligent computing (ICIC) that was held in Bari, Italy, on October 2-5, 2020. ICIC was formed to provide an annua...
详细信息
The eight papers in this special section were presented at the Sixteenth internationalconference on Intelligent computing (ICIC) that was held in Bari, Italy, on October 2-5, 2020. ICIC was formed to provide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and industry to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing.
Due to their versatility and effectiveness, Deep Learning (DL) approaches are increasingly used in designing Network Intrusion Detection Systems (NIDSs). Specifically, Anomaly Detection (AD) approaches such as AutoEnc...
详细信息
ISBN:
(纸本)9798350374520;9798350374513
Due to their versatility and effectiveness, Deep Learning (DL) approaches are increasingly used in designing Network Intrusion Detection Systems (NIDSs). Specifically, Anomaly Detection (AD) approaches such as AutoEncoders proved suitable when malicious traffic for training is not available. However, understanding how and why DL models provide a certain decision is often challenging, since they are often considered black boxes. In this paper, we develop a methodology based on SHAP-a well-known eXplainable Artificial intelligence (XAI) technique-to elucidate the contribution of traffic features to the decisions of anomaly detectors. The interpretability gained through our methodology facilitates a deeper understanding of the characteristics of network traffic that drive the detection process. We evaluate our methodology on two recent IoT datasets including attack traffic (Kitsune and IoT-23). Leveraging the interpretability results, our investigation yields substantial enhancements in model complexity (up to -98%) without compromising its detection capabilities. The experimental results underscore the potential of XAI in refining and advancing the landscape of NIDSs.
The fast-emerging technologies in this century fueled by covid19 crises has taught every stakeholder (technology giants, pharmacists, hospitals, patients etc.) a great lesson. Hospital with good healthcare system will...
详细信息
This paper considers the technologies to analyze and process medical data. Such technologies as bigdata, blockchain, cloud computing, IoT, machine learning, and artificial intelligence are discussed in the paper. The...
详细信息
ISBN:
(数字)9798350399851
ISBN:
(纸本)9798350399851
This paper considers the technologies to analyze and process medical data. Such technologies as bigdata, blockchain, cloud computing, IoT, machine learning, and artificial intelligence are discussed in the paper. The advantages and disadvantages of these technologies for use in healthcare are considered. A comparative analysis of technologies was carried out in order to identify the optimal solution for implementation to the current healthcare system, that meets the main requirements for healthcare systems: data confidentiality, fault-tolerant system and fast access to data.
In order to optimize the core problems encountered in the operation of urban and rural logistics and improve the informatization degree of rural logistics, the authors of this paper conduct research on the application...
详细信息
暂无评论