For decades, satellites have facilitated remote internet of things (IoT) services. However, the recent proliferation of increasingly capable sensors and a surge in the number deployed, has led to a substantial growth ...
详细信息
The real implementation of a recurrent neural network (RNN) in a low complexity IoT device is evaluated in order to predict the time series of power consumption in tertiary buildings. The RNN type long short-term memo...
详细信息
ISBN:
(纸本)9781538674628
The real implementation of a recurrent neural network (RNN) in a low complexity IoT device is evaluated in order to predict the time series of power consumption in tertiary buildings. The RNN type long short-term memory (LSTM) algorithm is adapted for a 32-bit microcontroller unit (MCU) and the backpropagation (BP) algorithm is implemented in-house. We therefore demonstrate that Intelligent IoT (IIoT) devices, such as the Espressif ESP32 MCU, not only implement neural networks (NNs), but also learn on their own. The resulting IIoT architecture has been proven to operate efficiently and compared to the traditional computer-based learning platform. The selected results confirm that stand-alone IoT devices are a truly efficient solution that adds flexibility to the architecture, reduces storage and computation costs, and is more energy-friendly. As a conclusion, it is practically more efficient to exploit low-power and processing-time IIoT for our prediction use case rather than relying on server based distributedsystems.
End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and integrity of online communication. While the highest security guarantees we...
详细信息
ISBN:
(纸本)9783031575365;9783031575372
End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and integrity of online communication. While the highest security guarantees were long reserved to two-party communication, solutions for n-party communication remained either inefficient or less secure until the standardization of the MLS Protocol (Messaging Layer Security). This new protocol offers an efficient way to provide end-to-end secure communication with the same guarantees originally offered by the Signal Protocol for two-party communication. However, both solutions still rely on a centralized component for message delivery, called the Delivery Service in the MLS Protocol. The centralization of the Delivery Service makes it an ideal target for attackers and threatens the availability of any protocol relying on MLS. In order to overcome this issue, we propose the design of a fully distributed Delivery Service that allows clients to exchange protocol messages efficiently and without any intermediary. It uses a Probabilistic Reliable-Broadcast mechanism to efficiently deliver messages and the Cascade Consensus Protocol to handle messages requiring an agreement. Our solution strengthens the availability of the MLS Protocol without compromising its security.
A wireless sensor network is a collection of small, low-power devices called sensors that are deployed in an area to monitor and gather data from the surrounding environment. Sensors can be deployed in two type either...
详细信息
Mammography is the most important diagnostic tool for early detection of breast cancer, which accounts for a significant proportion of cancer-related mortality in women. computer-aided diagnosis systems, especially th...
详细信息
ISBN:
(纸本)9798350313345;9798350313338
Mammography is the most important diagnostic tool for early detection of breast cancer, which accounts for a significant proportion of cancer-related mortality in women. computer-aided diagnosis systems, especially those empowered by deep neural networks, offer promising advancements in mammographic analysis. This paper evaluates four state-of-the-art Vision-Language Models (VLMs), namely CLIP, BiomedCLIP, PubMedCLIP, and ALIGN, on two essential tasks: Breast Density and BI-RADS Assessment. Leveraging VinDr-Mammo and EMBED datasets, our experiments investigate both zero-shot and fine-tuning approaches, as well as the impact of dataset distribution, data efficiency, and undersampling techniques. Our findings indicate that fine-tuning pre-trained models on mammography-specific data significantly enhanced model performance with varying degrees of improvement across different tasks and models.
In recent years, the integration of advanced technologies in industrial control processes has gained significant attention, particularly in the domain of wastewater systems. One emerging technology with promising pote...
详细信息
Vulnerabilities in software and distributedsystems are increasing, and system security becomes a challenge for developers. Giving a quick vulnerability classification for newly discovered vulnerabilities is helpful f...
详细信息
distributed computing plays a pivotal role in revolutionizing the management of clinical data within the healthcare sector. This technology facilitates the global exchange of healthcare documents through electronic co...
详细信息
Solving sparse triangular linear systems (spTRSV) represents a basic core in numerous scientific and computational applications such as numerical linear algebra routines including Gaussian Elimination, LU and Cholesky...
详细信息
Compute-In-Memory (CiM) is a promising solution to accelerate Deep Neural networks (DNNs) as it can avoid energy-intensive DNN weight movement and use memory arrays to perform low-energy, high-density computations. Th...
详细信息
暂无评论