As image generators based on diffusion models and Generative Adversarial networks (GANs) become widely accessible and user-friendly, it is crucial to explore the impact of AI-generated artworks. These creations, which...
详细信息
ISBN:
(纸本)9798331540715;9798331540708
As image generators based on diffusion models and Generative Adversarial networks (GANs) become widely accessible and user-friendly, it is crucial to explore the impact of AI-generated artworks. These creations, which rival traditional works, spark debates about authenticity and legal recognition. Advocates highlight creativity, while skeptics question human authorship. The boundary between AI and traditional art remains contentious, affecting issues of attribution and ownership. In our pilot study, individuals were asked (n = 45) to choose between handmade artworks, co-designed pieces, and text-prompt-generated images. Additionally, participants were inquired whether they could identify AI-generated images (n = 30). Our findings reveal that while individuals can often distinguish AI-generated art (accuracy=70.37%), this does not impact their preference.
In recent times, face biometric systems have recognized widely and got attention in computer vision. Further, the biometric face recognition systems are susceptible for face spoofing attacks, where an attacker uses a ...
详细信息
In addressing the significant challenges caused by the expansion of data storage needs in blockchain systems, this paper explores the integration of the InterPlanetary File System (IPFS) with Substrate-based blockchai...
详细信息
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself...
详细信息
ISBN:
(纸本)9798350375442
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself. Healthcare, the military, sports, and remote treatment are just a few of the modern WBSN applications. It improves people's quality of life by allowing for more precise and quicker disease diagnosis as well as more timely care and more effective treatment. Even if a patient is far away from medical care, WBSN can still save their life. Despite the numerous benefits that WBSN technology brings to healthcare systems, there are legitimate concerns about security and privacy when it comes to collecting and transmitting physiological data about humans in an open setting. Ensuring the security of physiological data during transmission in a wireless environment is a challenging but crucial task. Key distribution, authentication, data integrity, and data confidentiality are just a few of the many security issues plaguing the WBSN. In tackling the WBSN security issues, this research contributes significantly. Secure transmission in wireless networks and high attack resistance are both provided by the cryptographic computational process. Nevertheless, the unsecure transmission of keys across networks is the sole vulnerability of public and private key cryptography methods. Attackers can easily crack traditional key sharing protocols used by communicating parties. Intruders can compromise the system's security in its entirety if they obtain the secret key. In WBSN, a secure way to generate and distribute secret keys is required. The EBB84QCP is a method for creating and sharing secret keys between communicating parties. Rather than using two prime numbers, the Enhanced and Modified RSA Cryptosystem (EMRSACS) suggests using four prime numbers for key generation, encryption, and decryption. Data transmission in wireless networks still involves a secret quantum key that is
The proceedings contain 138 papers. The topics discussed include: maximizing the performance of data-driven capacity estimation for lithium-ion battery;optimizing the placement and sizing of a predefined number of bat...
The proceedings contain 138 papers. The topics discussed include: maximizing the performance of data-driven capacity estimation for lithium-ion battery;optimizing the placement and sizing of a predefined number of battery energy storage systems on distribution networks;a study on restoration plan after blackout of a system with 100% inverter based resources considering bus inertia;augmented Lagrangian guided learning for the optimal power flow problem;experimental validation of virtual inductance for synchronization of grid-forming converters;scheduling strategy design of multi-energy integrated energy system considering source-net-load coupling;a unified distributed digital control architecture for secondary control in islanded microgrids;robust and chance-constrained dispatch policies for linear power systems;and a backstepping-based approach for distributed output containment control of high order multi-agent systems with applications in power systems.
The proceedings contain 3 papers. The topics discussed include: cost-efficient construction of performance models;using benchmarking and regression models for predicting CNN training time on a GPU;and benchmarking mac...
ISBN:
(纸本)9798400706455
The proceedings contain 3 papers. The topics discussed include: cost-efficient construction of performance models;using benchmarking and regression models for predicting CNN training time on a GPU;and benchmarking machine learning applications on heterogeneous architecture using reframe.
We give a simple characterization of which functions can be computed deterministically by anonymous processes in dynamic networks, depending on the number of leaders in the network. In addition, we provide efficient d...
详细信息
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ...
详细信息
Generative Adversarial networks (GANs)1 have demonstrated remarkable success in generating realistic images, and are increasingly used for image-to-image translation tasks in medical imaging. However, methods like Pix...
详细信息
With the development of remote sensing technology to high resolution, high resolution remote sensing images are widely used in change detection. This paper uses Convolutional Neural Network (CNN) as its core model. Th...
详细信息
暂无评论