Data security is becoming increasingly important as cloud computing advances. Data security is the fundamental problem of all distributedcomputing systems. Cloud computing enables access to distributedapplications a...
详细信息
Aggregate computing is an emerging macropro-gramming paradigm, whose validation is often performed by simulation. In this work, we compare the existing JVM-based toolkits from a performance point of view and show that...
详细信息
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor...
详细信息
In this study, we investigate the propagation of information about visual stimuli through the brain. In our previous work, we designed a three-dimensional spiking neural network (3D-SNN) structure based on an availabl...
详细信息
ISBN:
(纸本)9798350368130
In this study, we investigate the propagation of information about visual stimuli through the brain. In our previous work, we designed a three-dimensional spiking neural network (3D-SNN) structure based on an available brain atlas for this aim. It was trained via reverse engineering, i.e., by feeding EEG recordings from a human subject during preparation for the performance of a visual task into the positions of the electrodes on the skull and letting the synapses adapt via spiketiming dependent plasticity rule. In the current work, a visual stimulus consisting of a sequence of images of dots with varying positions was processed by spatiotemporal filters mimicking retinal ganglion cells and was fed as generating currents to the neurons in the brain sensory relay - the thalamus. The study aims to observe the propagation of the visual stimulus information and stages of its conscious perception.
In light of recent advancements in Internet of Multimedia Things (IoMT) and 5G technology, both the variety and quantity of data have been rapidly increasing. Consequently, handling zero-shot cross-modal retrieval (ZS...
详细信息
Under the rapid development of big data and cloud computing, emerging applications have seen significant improvements in efficiency and service quality. Nevertheless, the conflict between data sharing and privacy pres...
详细信息
This paper proposes an integrated smart energy management system that applies different machine learning regression techniques to gather, enhance, and prepare various relevant data taken from the surrounding environme...
详细信息
This volume contains the proceedings of the Colloquium in honor of Rocco De Nicola's 70(th) birthday, held jointly with the ISOLA 2024's track on REoCAS (Rigorous engineering of Collective Adaptive Systems). R...
详细信息
ISBN:
(纸本)9783031737084;9783031737091
This volume contains the proceedings of the Colloquium in honor of Rocco De Nicola's 70(th) birthday, held jointly with the ISOLA 2024's track on REoCAS (Rigorous engineering of Collective Adaptive Systems). Rocco De Nicola has significantly contributed to collective adaptive systems through novel approaches for their formal specification, analysis, and verification. The Colloquium features one homage paper and 23 contributions from invited authors who reflected upon these developments within the context of Rocco's much broader legacy in concurrency theory, distributed systems, domain-specific languages, service-oriented computing, and formal methods, exploring his recent contributions to cybersecurity.
The fast Fourier transform (FFT) [1] efficiently computes the discrete Fourier transform (DFT), an algorithm used to calculate the frequency components of discrete-time signals. The FFT is used in frequency analysis, ...
详细信息
Tensor factorization plays a fundamental role in multiple areas of AI research. Nevertheless, it encounters significant challenges related to privacy breaches and operational efficiency. In this study, we propose a no...
详细信息
暂无评论