The nonnegative matrix factorization algorithm is an effective data dimensionality reduction method. The principle is to convert the image into a nonnegative linear combination of low dimensional basis images. Nonnega...
详细信息
In the field of icon line art colorization, several Generative Adversarial Networks (GANs) based methods have achieved remarkable success. However, these methods often suffer from issues such as noise, color inconsist...
详细信息
Stuttering or stammering is a common neurogenic, psychogenic fluency disorder wherein people have uncontrolled blocks on the natural flow of speech. Automatic Stuttering Event Detection (SED) is a widely recognised ch...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
The convolutional neural network (CNN) has been widely adopted in the processing of hyperspectral images (HSI) due to its remarkable capabilities in feature extraction. However, CNN-based methods for HSI classificatio...
详细信息
This research paper describes and extends the outcomes from an in- depth study investigating the difference in the expected skills requirements from junior software engineers to senior software engineers, and reflecti...
详细信息
ISBN:
(纸本)9798350351507
This research paper describes and extends the outcomes from an in- depth study investigating the difference in the expected skills requirements from junior software engineers to senior software engineers, and reflections on the findings from that study. It is a given that senior software engineers have more experience and skills than junior software engineers. However, a focus on their differing competencies and dispositions provides an enhanced mechanism for comparison. Gaps were identified in assessing 'professional knowledge' as categorized by the IEEE/ACM Computing Curriculum Overview Report (CC2020), and in assessing 'dispositions'. It appeared that the specific scenario of comparing the expected competencies between junior and senior software engineers, tested the framework for assessing competencies developed in the CC2020 project and applied in its mapping to the IEEE/ACM Computer science (CS2013) approved curriculum. In this study into the difference between Junior and Senior software Engineers, an initial review of relevant literature was conducted. The review found that research analyzing job requirements for software engineers of different levels was limited;'experience' as a keyword was seldom mentioned;and a common distinction was made between 'soft' and 'hard' skills - the latter being skills that were 'technical', such as programming languages, frameworks, libraries, and tools, whereas soft skills referred to skills such as personality traits, attitudes, and teamwork skills. In our extension of that work the notion of soft skills was unpacked into professional skills and dispositions. The process of mapping from the CC2020 competency framework to the CS2013 curriculum had deliberately modelled how to represent a competency-based rather than a knowledge-based curriculum. The critical deficiency identified here was the limitation imposed by adopting a skills framework based on the cognitive taxonomy, and thereby unwittingly omitting the crucial compani
In this paper, an intelligent blind glasses system based on stair & step recognition is proposed, which combines the innovative appearance of the product and the high performance advantages of functional modules t...
详细信息
The proliferation of collaborative technologies and the Internet of Things (IoT) has led to a greater diversity of devices. However, it also increased their vulnerability to potential attacks. The inherent heterogenei...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
The proliferation of collaborative technologies and the Internet of Things (IoT) has led to a greater diversity of devices. However, it also increased their vulnerability to potential attacks. The inherent heterogeneity and complexity of IoT devices make it difficult to accurately detect abnormal behavior, leaving them open to manipulation by attackers. To address this issue, we propose Talos, an innovative solution to detect abnormal device behavior in IoT systems. Talos employs advanced deep neural networks to analyze and comprehend historical event sequences, enabling it to accurately model the normal behaviors of IoT devices and detect any anomalies through reconstruction error. We evaluate our prototype on a real-world testbed and test it for three different anomaly cases. The experimental results demonstrate that Talos achieved high precision and recall, achieving an average F1-Score of 99.73% while raising only a few false alarms.
Cryptographic algorithms are fundamental to security. However, it has been shown that secret information could be effectively extracted through monitoring and analyzing the cache side-channel information (i.e., hit an...
详细信息
作者:
Baowei WangLuyao ShenJunhao ZhangZenghui XuNeng WangSchool of Computer
Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software
Nanjing University of Information Science and TechnologyNanjing210044China
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text...
详细信息
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark,an anti-print scanning watermarking algorithm suitable for text images is *** algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform(DWT)-Singular Value Decomposition(SVD)to embed the *** show that the average Normalized Correlation(NC)of the watermark extracted by this algorithm against attacks such as Joint Photographic Experts Group(JPEG)compression,JPEG2000 compression,and print scanning is above ***,the average NC of the watermark extracted after print scanning attacks is greater than 0.964,and the average Bit Error Ratio(BER)is 5.15%.This indicates that this algorithm has strong resistance to various attacks and print scanning attacks and can better take into account the invisibility of the watermark.
暂无评论